GR 203335 Disini V Sec of Justice
GR 203335 Disini V Sec of Justice
GR 203335 Disini V Sec of Justice
G.R. No. 203335 - JOSE JESUS M. DISINI, JR., et al, Petitioners, v. THE
SECRETARY OF JUSTICE, et al., Respondents; G.R. No. 203299 - LOUIS
"BAROL" C. BIRAOGO, Petitioner, \r. NATIONAL BUREAU OF
INVESTIGATION and PHILIPPINE NATIONAL POLICE, Respondents;
G.R. No. 203306 - ALAB NG MAMAMAHAYAG (ALAM), et al.,
Petitioners, v. OFFICE OF THE PRESIDENT, et al., Respondents; G.R.
No. 203359 - SENATOR TEOFISTO GUINGONA III, Petitioner, v. THE
EXECUTIVE SEC~TARY, et al.,_ Respondents; G.R. No. 203378 ALEXANDER ADONIS, et al., Petitioners, v. THE EXECUTIVE
SECRETARY, et al., Respondents; G.R. No. 203391 - HON. RAYMOND
PALATINO, et al., Petitioners, v. HON. PAQUITO OCHOA, JR., et al.,
Respondents; G.R. No. 203407
BAGONG ALYANSANG
MAKABAYAN SECRETARY GENERAL RENATO M. REYES, JR., et
al., Petitioners, v. BENIGNO SIMEON AQUINO III, et al., Respondents;
G.R. No. 203440 - MELENCIO STA. MARIA, et al., Petitioners, v. HON.
PAQUITO OCHOA, JR., et al., Respondents; G.R. No. 203453 - PAUL
CORNELIUS CASTILLO, et al., Petitioners, v. HIS EXCELLENCY
BENIGNO AQUINO III, et al., Respondents; G.R. No. 203454 ANTHONY IAN CRUZ, et al., Petitipners, v. HIS EXCELLENCY
BENIGNO AQUINO III, et al., Respondents;" G.R. No. 203501 PHILIPPINE BAR ASSOCIATION, INC., Petitioner, v. HIS
EXCELLENCY BENIGNO SIMEON AQUINO III, et al., Respondents;
G.R. No. 203509 - BAYAN _MUNA REPRESENTATIVE NERI
COLMENARES, Petitioner, v. THE EXECUTIVE SECRETARY
PAQUITO OCHOA, JR., Respondent; G.R. No. 203515 - NATIONAL
PRESS CLUB OF THE PHILIPPINES, INC., et al., Petitioner, v. OFFICE
OF THE PRESIDENT BENIGNO SIMEON AQUINO III, et al.,
Respondents; G.R. No. 203518 - PHILIPPINE INTERNET FREEDOM
ASSOCIATION, et al., Petitioners, v. THE EXECUTIVE SECRETARY, et
al. Respondents
Promulgated:
FEBRUARY 18,
x
201,v
Opinion
stifled because of the broadness of the scope of the text of the provision. In
view of the primacy of this fundamental right, judicial review of the statute
itself, even absent an actual case, is viable.
With this approach, I am of the opinion that the constitution requires
that libel as presently contained in the Revised Penal Code and as reenacted
in the Cybercrime Prevention Act of 2012 (Rep. Act No. 10175) be struck
down as infringing upon the guarantee of freedom of expression provided in
Article III, Section 4 of our Constitution. I am also of the firm view that the
provisions on cybersex as well as the provisions increasing the penalties of
all crimes committed with the use of computers are unconstitutional. The
provision limiting unsolicited commercial communications should survive
facial review and should not be declared as unconstitutional.
I concur with the majority insofar as they declare that the take down
clause, the provision allowing dual prosecutions of all cybercrimes, and the
provision that broadly allows warrantless searches and seizures of traffic
data, are unconstitutional. This is mainly because these present unwarranted
chilling effects on the guaranteed and fundamental rights of expression.
I
Framework of this Opinion
Reality can become far richer and more complex than our collective
ability to imagine and predict. Thus, conscious and deliberate restraint at
times may be the better part of judicial wisdom.
The judiciarys constitutionally mandated role is to interpret and apply
the law. It is not to create or amend law on the basis of speculative facts
which have not yet happened and which have not yet fully ripened into clear
breaches of legally demandable rights or obligations. Without facts that
present an actual controversy, our inquiry will be roving and unlimited. We
substitute our ability to predict for the rigor required by issues properly
shaped in adversarial argument of the real. We become oracles rather than a
court of law.
This is especially so when the law is made to apply in an environment
of rapidly evolving technologies that have deep and far-reaching
consequences on human expression, interaction, and relationships. The
internet creates communities which virtually cross cultures, creating
cosmopolitarian actors present in so many ways and in platforms that we are
yet starting to understand.
Opinion
Petitioners came to this court via several petitions for certiorari and/or
prohibition under Rule 65 of the Rules of Court. They seek to declare certain
provisions of Rep. Act No. 10175 or the Cybercrime Prevention Act of
20121 as unconstitutional. They allege grave abuse of discretion on the part
of Congress. They invoke our power of judicial review on the basis of the
textual provisions of the statute in question, their reading of provisions of the
Constitution, and their speculation of facts that have not happened may or
may not happen in the context of one of the many technologies available
and evolving in cyberspace. They ask us to choose the most evil among the
many possible but still ambiguous future factual permutations and on that
basis declare provisions not yet implemented by the Executive or affecting
rights in the concrete as unconstitutional. In effect, they ask us to do what
the Constitution has not even granted to the President: a provision-byprovision veto in the guise of their interpretation of judicial review.
Although pleaded, it is difficult to assess whether there was grave
abuse of discretion on the part of the Executive. This court issued a
temporary restraining order to even proceed with the drafting of the
implementing rules. There has been no execution of any of the provisions of
the law.
This is facial review in its most concrete form. We are asked to render
a pre-enforcement advisory opinion of a criminal statute. Generally, this
cannot be done if we are to be faithful to the design of our Constitution.
The only instance when a facial review is permissible is when there is
a clear showing that the provisions are too broad under any reasonable
reading that it imminently threatens expression. In these cases, there must be
more of a showing than simply the in terrorem effect of a criminal statute. It
must clearly and convincingly show that there can be no determinable
standards that can guide interpretation. Freedom of expression enjoys a
primordial status in the scheme of our basic rights. It is fundamental to the
concept of the people as sovereign. Any law regardless of stage of
implementation that allows vague and unlimited latitude for law
enforcers to do prior restraints on speech must be struck down on its face.
This is the framework taken by this opinion.
The discussion in this dissenting and concurring opinion is presented
in the following order:
1. Justiciability
2. The Complexity of the Internet and the Context of the Law
1
Rep. Act No. 10175, sec. 1. The law was the product of Senate Bill No. 2796 and House Bill No. 5808.
Opinion
3
4
5
6
Judicial power includes the duty of courts of justice to settle actual controversies involving rights
which are legally demandable and enforceable, and to determine whether or not there has been a grave
abuse of discretion amounting to lack or excess of jurisdiction on the part of any branch or
instrumentality of Government.
Consti., art. VIII, sec. 1.
Consti., art. VIII, sec. 1.
Tanada v. Cuenco, G.R. No. L-10520, 100 Phil. 1101 (1957) [Per J. Concepcion, En Banc].
Philippine Association of Colleges and Universities v. Secretary of Education, 97 Phil. 806, 809 (1955)
[Per J. Bengzon, En Banc].
Levy Macasiano v. National Housing Authority, G.R. No. 107921, July 1, 1993, 224 SCRA 236, 242
[Per CJ Davide, Jr., En Banc].
Angara v. Electoral Commission, 63 Phil. 139, 158 (1936) [Per J. Laurel, En Banc].
Opinion
10
11
12
Southern Hemisphere Engagement Network v. Anti-Terrorism Council, G.R. No. 178552, October 5,
2010, 632 SCRA 146, 176 [Per J. Carpio-Morales, En Banc], citing Republic Telecommunications
Holding, Inc. v. Santiago, 556 Phil. 83, 91 (2007) [Per J. Tinga, Second Division].
499 Phil. 281 (2005) [Per C.J. Panganiban, En Banc].
Id. at 304-305.
G.R. No. 187883, June 16, 2009, 589 SCRA 356 [Per C.J. Puno, En Banc].
Opinion
the court give opinions in the nature of advice concerning
legislative or executive action.(Emphasis supplied) 13
Id. at 357-358.
63 Phil. 139 (1936) [Per J. Laurel, En Banc].
Id. at 158.
G.R. No. 204603, September 24, 2013 [Per J. Perlas-Bernabe, En Banc].
Opinion
remarks tended towards any prosecutorial or governmental action
geared towards the implementation of RA 9372 against them. In
other words, there was no particular, real or imminent threat to any
of them. 17 (Emphasis supplied)
None of the petitioners in this case have been charged of any offense
arising from the law being challenged for having committed any act which
they have committed or are about to commit. No private party or any agency
of government has invoked any of the statutory provisions in question
against any of the petitioners. The invocations of the various constitutional
provisions cited in petitions are in the abstract. Generally, petitioners have
ardently argued possible applications of statutory provisions to be invoked
for future but theoretical state of facts.
The blanket prayer of assailing the validity of the provisions cannot be
allowed without the proper factual bases emanating from an actual case or
controversy.
II
The Complexity of the Internet
and the Context of the Law
This is especially so when the milieu is cyberspace.
17
18
19
Id.
Southern Hemisphere Engagement Network, Inc. v. Anti-Terrorism Council, G.R. No. 178552, October
5, 2010, 632 SCRA 146, 176 [Per J. Carpio-Morales, En Banc].
Id. at 179.
Opinion
21
22
23
D. MACLEAN, Herding Schrdingers Cats: Some Conceptual Tools For Thinking About Internet
Governance, Background Paper for the ITU Workshop on Internet Governance, Geneva, February 2627, 2004, 8 <http://www.itu.int/osg/spu/forum/intgov04/contributions/itu-workshop-feb-04-internetgovernance-background.pdf> (visited October 16, 2013).
Brief History of the Internet <http://www.internetsociety.org/internet/what-internet/historyinternet/brief-history-internet> (visited October 16, 2013).
'Comprehensive Study on Cybercrime prepared by United Nations Office on Drugs and Crime for the
Intergovernmental
Expert
Group
on
Cybercrime,
February
2013,
<http://www.unodc.org/documents/commissions/CCPCJ_session22/13
80699_Ebook_2013_study_CRP5.pdf> (visited October 16, 2013).
Id.
Opinion
25
26
27
28
29
30
10
Opinion
Id.
Id. at 279.
Id.
Id. Government or state-run.
Id.
Id.
Id. at 282.
Id. at 280.
11
Opinion
40
41
42
43
44
45
Some call this generativity, i.e. a systems capacity to produce unanticipated change through
unfiltered contributions from broad and varied audiences. J. L. ZITTRAIN, THE FUTURE OF THE
INTERNET AND HOW TO STOP IT 70 (2008).
J. L. ZITTRAIN, THE FUTURE OF THE INTERNET AND HOW TO STOP IT (2008).
Brief History of the Internet <http://www.internetsociety.org/internet/what-internet/historyinternet/brief-history-internet> (visited October 16, 2013).
D. MACLEAN, Herding Schrdingers Cats: Some Conceptual Tools For Thinking About Internet
Governance, Background Paper for the ITU Workshop on Internet Governance, Geneva, February 2627, 2004, 8 <http://www.itu.int/osg/spu/forum/intgov04/contributions/itu-workshop-feb-04-internetgovernance-background.pdf> (visited October 16, 2013).
Measuring the Information Society 2012, International Telecommunication Union, 2012, Geneva,
Switzerland,
6-7
<http://www.itu.int/en/ITUD/Statistics/Documents/publications/mis2012/MIS2012_without_Annex_4.pdf> (visited October 16,
2013). The International Telecommunication Union (ITU) is the United Nations specialized agency
for information and communication technologies (ICTs).
Id. at 10.
In the Internet of things, objects such as household appliances, vehicles, power and water meters,
medicines or even personal belongings such as clothes, will be capable of being assigned an IP
address, and of identifying themselves and communicating using technology such as RFID and NFC.
Comprehensive Study on Cybercrime prepared by United Nations Office on Drugs and Crime for the
Intergovernmental
Expert
Group
on
Cybercrime,
February
2013,
2
12
Opinion
Philippines
78%
87%
79%
72%
51%
46
47
48
49
13
Opinion
Percentage
of
respondents who
agreed or agreed
strongly
(GLOBAL)
(PHILIPPINES)
91%
85%
93%
96%
50
51
52
95%
70%
89%
74%
92%
72%
92%
61%
75%
65%
84%
63%
80%
92%
91%
Id.
Id. at 10.
Global Internet User Survey 2012 <https://www.Internetsociety.org/sites/default/files/GIUS2012GlobalData-Table-20121120_0.pdf> (visited October 16, 2013).
14
Opinion
10. Preventing the trafficking of women and 69%
children
11. Improving the quality of education
80%
84%
93%
95%
96%
94%
Percentage
of
respondents
who
agreed or agreed
strongly
(GLOBAL)
(PHILIPPINES)
88%
85%
86%
91%
55
Id.
The State of Broadband 2012: Achieving Digital Inclusion for All, Report prepared by the
Broadband
Commission
for
Digital
Development,
September
2012,
23
<http://www.broadbandcommission.org/documents/bb-annualreport2012.pdf> (visited October 16,
2013).
As cited by the Broadband Commission for Digital Development in The State of Broadband 2012:
Achieving Digital Inclusion for All. The Broadband Commission was set up by the ITU and the
United Nations Educational, Scientific and Cultural Organization (UNESCO) pursuant to the
15
Opinion
II (D)
The Dangers in the Internet
While the internet has engendered innovation and growth, it has also
engendered new types of disruption. A noted expert employs an
evolutionary metaphor as he asserts:
[Generative technologies] encourage mutations, branchings away from
the status quosome that are curious dead ends, others that spread like
wildre. They invite disruptionalong with the good things and bad
things that can come with such disruption. 56
56
57
58
59
16
Opinion
[The] development of information and communications technologies and
the increasing use of the Internet create new opportunities for offenders
and facilitate the growth of crime. 60
Details
Viruses and worms are computer programs that affect the storage
devices of a computer or network, which then replicate information
without the knowledge of the user.
Spam emails
60
61
62
63
64
65
Id. at 6-7.
Issues Monitor: Cyber Crime--A Growing Challenge for Governments, KPMG International 2014, 3
<http://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublications/Documents/cybercrime.pdf> (visited October 16, 2013), citing National insecurity, Information Age, January 26, 2011
and Stuxnet was about what happened next, FT.com, February 16, 2011.
In 1994, the United Nations Manual on the Prevention and Control of Computer Related Crime noted
that fraud by computer manipulation; computer forgery; damage to or modifications of computer data
or programs; unauthorized access to computer systems and service; and unauthorized reproduction of
legally protected computer programs were common types of computer crime. Comprehensive Study
on Cybercrime prepared by United Nations Office on Drugs and Crime for the Intergovernmental
Expert
Group
on
Cybercrime,
February
2013,
5
<http://www.unodc.org/documents/commissions/CCPCJ_session22/13
80699_Ebook_2013_study_CRP5.pdf> (visited October 16, 2013).
Love bug hacker is Pandacan man, 23 <http://www.philstar.com/networks/83717/love-bug-hackerpandacan-man-23> (visited October 16, 2013).
Issues Monitor: Cyber Crime--A Growing Challenge for Governments, KPMG International 2014, 2
<http://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublications/Documents/cybercrime.pdf> (visited October 16, 2013).
Id. at 2, citing Cyber attacks: from Facebook to nuclear weapons, The Telegraph, February 4, 2011; A
Good Decade for Cybercrime, McAfee, 2010; Spamhaus on March 10, 2011; PCMeg.com on March
10, 2011; and The cost of cybercrime, Detica, February 2011.
17
Opinion
creating a wide range of problems if they are not filtered appropriately.
Trojan
Denial-of-service
(DoS)
Malware
Scareware
Phishing
Fiscal fraud
Carders
The shift from wired to mobile devices has also brought with it the
escalation of attacks on mobile devices. As reported by IT security group
McAfee, [t]he number of pieces of new mobile malware in 2010 increased
by 46 percent compared with 2009. 66 Hackers have also increased targeting
mobile devices using Apples iOS and Googles Android systems as these
increased their market share. As McAfee put it, cybercriminals are keeping
tabs on whats popular. 67
66
67
McAfee Q4 Threat Report Identifies New Attacks on Mobile Devices; Malware Growth at All-Time
High <http://www.mcafee.com/mx/about/news/2011/q1/20110208-01.aspx> (visited October 16,
2013).
Id.
18
Opinion
2.
-
3.
-
4.
-
II (E)
The Challenges for
Internet Governance
All these have triggered spirited discussion on what has been termed
as internet governance or internet/cyberspace regulation.
Particularly challenging are the jurisdictional challenges that virtual
computer networks posed to territorially constituted nation states x x
68
69
70
71
Issues Monitor: Cyber Crime--A Growing Challenge for Governments, KPMG International 2014, 6
<http://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublications/Documents/cybercrime.pdf> (visited October 16, 2013)
Id., citing The cost of cybercrime, Detica, February 2011.
Id., citing Cybercrime in Germany on the rise, DW World, September 7, 2010.
Id., citing The cost of cybercrime, Cabinet Office (UK), February 2011.
19
Opinion
72
73
74
75
76
77
20
Opinion
There are private bodies and organizations that exist for the purpose of
regulation. There are commercial entities vendors and service providers
that emerge as de facto regulators. A noted expert observes that an
increasing response has been the creation of devices and services which rely
on a continuing relationship with vendors and service providers who are then
accountable for ensuring security and privacy. 79 There is now a marked
tendency to resort to sterile appliances tethered to a network of control. 80
This may stunt the very capacity to produce unanticipated change through
unfiltered contributions from broad and varied audiences. 81 It is these
unanticipated changes which facilitated the internets rise to ubiquity.
The fear is that too much reliance on commercial vendors and their
standards and technologies transfers control over the all important internet
from innovation from varied sources. In a way, it stunts democratic
creativity of an important media.
On the other end, states have consciously started more legal
intervention. As observed by the United Nations Office on Drugs and Crime:
Legal measures play a key role in the prevention and combating of
cybercrime. Law is [a] dynamic tool that enables the state to respond to new
societal and security challenges, such as the appropriate balance between privacy
and crime control, or the extent of liability of corporations that provide services.
In addition to national laws, at the international level, the law of nations
international law covers relations between states in all their myriad forms.
Provisions in both national laws and international law are relevant to
cybercrime. 82
78
79
80
81
82
21
Opinion
1. Setting clear standards of behavior for the use of computer devices;
2. Deterring perpetrators and protecting citizens;
3. Enabling law enforcement investigations while protecting individual
privacy;
4. Providing fair and effective criminal justice procedures;
5. Requiring minimum protection standards in areas such as data handling
and retention; and
6. Enabling cooperation between countries in criminal matters involving
cybercrime and electronic evidence. 83
II (F)
The Lack of a Universal
Policy Consensus: Political
Nature of the Content of
Cybercrime Legislation
The description of the acts in cyberspace which relates to new
concepts and objects, not traditionally addressed by law 85 challenges the
very concept of crimes. This is of preeminent significance as there can be no
83
84
85
Id. at 52.
Id. at 51-52.
Id. at 51.
22
Opinion
crime where there is no law punishing an act (nullum crimen, nulla poena
sine lege). 86
The Comprehensive Study on Cybercrime prepared by UNODC for
the Intergovernmental Expert Group on Cybercrime, February 2013, reports
that a survey of almost 200 pieces of national legislation fails to establish a
clear definition of cybercrime. If at all, domestic laws tend to evade having
to use the term cybercrime altogether:
Out of almost 200 items of national legislation cited by countries in
response to the Study questionnaire, fewer than five per cent used the
word cybercrime in the title or scope of legislative provisions. Rather,
legislation more commonly referred to computer crimes, electronic
communications, information technologies, or high-tech crime. In
practice, many of these pieces of legislation created criminal offences
that are included in the concept of cybercrime, such as unauthorized
access to a computer system, or interference with a computer system or
data. Where national legislation did specifically use cybercrime in the
title of an act or section (such as Cybercrime Act), the definitional
section of the legislation rarely included a definition for the word
cybercrime. When the term cybercrime was included as a legal
definition, a common approach was to define it simply as the crimes
referred to in this law. 87
Id. at 53.
Id. at 11-12.
Id. at 12.
23
Opinion
cybercrime. The UNODC notes that nine (9) of these instruments are
binding, 89 while seven (7) are non-binding. 90 In all, these instruments
include a total of eighty-two (82) countries which have signed and/or ratified
them. Of these, it is the Council of Europe Cybercrime Convention which
has the widest coverage: Forty-eight (48) countries, 91 including five (5) nonmember states of the Council of Europe, have ratified and/or acceded to it.
Other instruments have significantly smaller scopes. For example, the
League of Arab States Convention only included eighteen (18) countries or
territories; the Commonwealth of Independent States Agreement, with ten
(10) countries; and the Shanghai Cooperation Organization Agreement, with
six (6) countries. 92
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
ITU / CARICOM
/ CTU (Model
Legislative
Texts 104
League of Arab
States
(Convention) 105
League of Arab
States
(Model
Law) 106
Shanghai
Cooperation
Organization 107
United
Nations
(CRC OP) 108
(Directive
2011/92/EU and
2002/58/EC) 103
(Directive
Framewrok
Decision
2001/413/JHA) 102
European Union
European Union
European
Union
(Directive
Proposal
2010/0273) 101
European
Union
(Framework Decision
100
2005/222/JHA)
ECOWAS 99
Council of Europe
(Lanzarote
Convention) 98
Council of Europe
(Budapest
Convention) 97
The
Commonwealth 95
COMESA 94
African Union 93
Criminalized Act
Commonwealth of
Independent
States 96
Id. at 64.
Id.
Id. at 67.
Comprehensive Study on Cybercrime prepared by United Nations Office on Drugs and Crime for the
Intergovernmental
Expert
Group
on
Cybercrime,
February
2013,
64
<http://www.unodc.org/documents/commissions/CCPCJ_session22/1380699_Ebook_2013_study_CRP5.pdf> (visited October 16, 2013).
African Union, 2012. Draft Convention on the Establishment of a Legal Framework Conducive to
Cybersecurity in Africa.
Common Market for Eastern and Southern Africa (COMESA), 2011. Cybersecurity Draft Model Bill.
The Commonwealth, 2002. (i) Computer and Computer Related Crimes Bill and (ii) Model Law on
Electronic Evidence.
Commonwealth of Independent States, 2001. Agreement on Cooperation in Combating Offences
related to Computer Information.
Council of Europe, 2001. Convention on Cybercrime and Additional Protocol to the Convention on
Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed
through computer systems.
Council of Europe, 2007. Convention on the Protection of Children against Sexual Exploitation and
Sexual Abuse.
Economic Community of West African States (ECOWAS), 2009. Draft Directive on Fighting
Cybercrime within ECOWAS.
European Union, 2005. Council Framework Decision 2002/222/JHA on attacks against information
systems.
European Union, 2010. Proposal COM (2010) 517 final for a Directive of the European Parliament and
of the Council on attacks against information systems and repealing Council Framework Decision
2005/222/JHA.
European Union, 2001. Council Framework Decision 2001/413/JHA combating fraud and
counterfeiting of non-cash means of payment.
European Union, 2011. Directive 2011/92/EU of the European Parliament and of the Council on
combating the sexual abuse and sexual exploitation of children and child pornography, and replacing
Council Framework Decision 2004/68/JHA and European Union, 2002. Directive 2002/58/EC of the
European Parliament and of the Council concerning the processing of personal data and the protection
of privacy in the electronic communications sector.
24
Opinion
1
Art. 2
Art. Art.
2 2(1)
and
3
Art. 3
Art. 6
III
(16)
Illegal access,
interception or
acquisition of
computer data
Art.
6
Illegal
intereference
with computer
data
Art. 7
Art. 8 Art. 6
Illegal
intereference
with a computer
system
Art. 9
Art. 6 Art. 7
Computer
misuse tools
Art. 10
Art. 9
Breach of
privacy or data
protection
measures
Art.
III
(27)
and
(54)
Computerrelated forgery
Art. Art.
III 23
(24)
and
(25)
Art. 7
Art.
8
Art. 2 and 4
Art. 11
Art. 10 Art. 4
and 18
Computerrelated fraud
Art. Art.
III 24
(25) (a)
,
and
(26) (b)
and
(41)
Art. 8
Art.
9,
10
and
23
Art. 2 and 4
Art. 12
Electronic
payment tools
offenses
Art. 3
Art. 2
10 Identity-related
crime
11 Computerrelated copyright
and trademark
offenses
104
105
106
107
108
Art.
11
Art. 18 Art. 11
Art. 14
Art. 17 Art. 14
25
Opinion
12 Spam
Art. 13 (3)
Art.
19
(g)
13 Computerrelated
harassment,
extortion or acts
causing personal
harm
Art. Art.
III 25
(40)
and
(41)
14 Computerrelated acts
involving racism
or xenophobia
Art.
III
(34)
,
(35)
and
(36)
Art. 18
15 ComputerArt.
related denial or III
justification of (37)
genocide or
crimes against
humanity
16 Computerrelated
production,
distribution, or
possession of
child
pornography
Art.
III
(29)
,
(30)
,
(31)
and
(32)
Art.
10
Art. 3, 4,
5 (OP)
Art.
18,
19
and
20
Art. 6
(OP)
Art.
21
Art. 9
17 Computerrelated
solicitation or
grooming of
children
18 Computerrelated acts in
support of
terrorism
Art. 15
Art. 20
Art. 5
Art,
14,
15,
16
and
17
Art. 23
Art. 13
Art. 9
Art. 12
Art. 6
Art. 15 Art. 21
Art. Art.
III 18,
(40) 19,
20
and
22
(a)
19 Computerrelated offenses
involving money
laundering
Art. 15 Art. 19
20 Computerrelated offenses
involving illicit
trafficking
Art. 16 Art. 17
and 18
21 Computerrelated offenses
against public
order, morality
or security
Art.
14,
15,
16
and
17
22 Law
Art.
enforcement
III
(54)
investigationrelated offenses
Art.
13
and
21
Art. 16
(3), 20
(3) and
21 (3)
Art. 16
and 17
23 Aggravating
Art.
circumstances III
for conventional (40)
crime committed
by means of a
computer system
24 Attempt and
aiding or
Art. 21
Art.
22
Art.
26
Art. 11
and 7
Art. 24
Art. 23
(3), 28
(3) and
29 (3)
Art. 8
Art. 3
26
Opinion
abetting
25 Corporate
liability
(OP)
Art.
27
Art. 12
Art. 26
110
111
112
113
114
Comprehensive Study on Cybercrime prepared by United Nations Office on Drugs and Crime for the
Intergovernmental
Expert
Group
on
Cybercrime,
February
2013,
12
<http://www.unodc.org/documents/commissions/CCPCJ_session22/1380699_Ebook_2013_study_CRP5.pdf> (visited October 16, 2013).
The United Nations Convention Against Corruption does not define corruption, but rather obliges
States Parties to criminalize a specific set of conduct which can be more effectively described.
Comprehensive Study on Cybercrime prepared by United Nations Office on Drugs and Crime for the
Intergovernmental
Expert
Group
on
Cybercrime,
February
2013,
12
<http://www.unodc.org/documents/commissions/CCPCJ_session22/1380699_Ebook_2013_study_CRP5.pdf> (visited October 16, 2013).
Id.
Id. at 16.
Id.
Id.
27
Opinion
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
League
of
Arab
States
(Model Law) 131
Shanghai
Cooperation
Organization 132
United Nations
(CRC OP) 133
European Union
(Directive 2011/92/EU
and 2002/58/EC) 128
European Union
(Directive
Framewrok Decision
2001/413/JHA) 127
European Union
(Directive Proposal
2010/0273) 126
European Union
(Framework Decision
2005/222/JHA) 125
ECOWAS 124
Council of Europe
(Lanzarote
Convention) 123
Council of Europe
(Budapest
Convention) 122
The
Commonwealth 120
COMESA 119
Procedural Power
Commonwealth
of
Independent States 121
Id.
Id. at 70.
Id.
African Union, 2012. Draft Convention on the Establishment of a Legal Framework Conducive to
Cybersecurity in Africa.
Common Market for Eastern and Southern Africa (COMESA), 2011. Cybersecurity Draft Model Bill.
The Commonwealth, 2002. (i) Computer and Computer Related Crimes Bill and (ii) Model Law on
Electronic Evidence.
Commonwealth of Independent States, 2001. Agreement on Cooperation in Combating Offences
related to Computer Information.
Council of Europe, 2001. Convention on Cybercrime and Additional Protocol to the Convention on
Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed
through computer systems.
Council of Europe, 2007. Convention on the Protection of Children against Sexual Exploitation and
Sexual Abuse.
Economic Community of West African States (ECOWAS), 2009. Draft Directive on Fighting
Cybercrime within ECOWAS.
European Union, 2005. Council Framework Decision 2002/222/JHA on attacks against information
systems.
European Union, 2010. Proposal COM (2010) 517 final for a Directive of the European Parliament and
of the Council on attacks against information systems and repealing Council Framework Decision
2005/222/JHA.
European Union, 2001. Council Framework Decision 2001/413/JHA combating fraud and
counterfeiting of non-cash means of payment.
European Union, 2011. Directive 2011/92/EU of the European Parliament and of the Council on
combating the sexual abuse and sexual exploitation of children and child pornography, and replacing
Council Framework Decision 2004/68/JHA and European Union, 2002. Directive 2002/58/EC of the
European Parliament and of the Council concerning the processing of personal data and the protection
of privacy in the electronic communications sector.
International Telecommunication Union (ITU)/Caribbean Community (CARICOM)/Caribbean
Telecommunications Union (CTU), 2010. (i) Model Legislative Texts on Cybercrime/e-Crimes and (ii)
Electronic Evidence.
League of Arab States, 2010. Arab Convention on Combating Information Technology Offences.
League of Arab States, 2004. Model Arab Law on Combating Offences related to Information
Technology Systems.
Shanghai Cooperation Organization, 2010. Agreement on Cooperation in the Field of International
Information Security.
United Nations, 2000. Optional Protocol to the Convention on the Rights of the Child on the sale of
children, child prostitution, and child pornography.
28
Opinion
1
Art. 19
(1) and
(2)
Art.
33
Art. 20
Art. 26
Art. 19
(3)
Art.
33
Art. 20
Art. 27 (1)
Art. Art. 15
36
(a)
Art. 18
(1)(1)
Art.
36
(b)
Art. 18
(1) (b)
Art. Art. 16
34
(a)
(ii)
Art. 17
(1) (b)
Art. 24
Art. 24
Real-time collection
of traffic data
Art. Art. 19
38
At. 20
Art. 25
Art. 28
Art. 21
Art. 26
Art. 29
Expedited
preservation of
computer-data
Art. 23
Art. 23 (2)
Use of (remote)
forensic tools
10
Trans-border access
to computer data
Art.
49
(b)
Art. 32
(b)
11
Provision of
assistance
Art. Art. 13
37
(d)
Art. 19
(4)
12
Retention of
computer data
Art.
29,
30
and
31
Art. 16,
17 (1) (a)
Art.
33
Art. 15
Art. 30
(5)
Art. 27
Art. 40 (2)
Art. 21
Art. 27 (2)
Art. 3
and 6
29
Opinion
(a)
Offenses against the confidentiality, integrity and availability of
computer data and systems:
(1)
(2)
(3)
(4)
(5)
Misuse of Devices.
(i)
The use, production, sale, procurement, importation, distribution,
or otherwise making available, without right, of:
(aa) A device, including a computer program, designed or adapted
primarily for the purpose of committing any of the offenses under this Act;
or
(bb) A computer password, access code, or similar data by which the
whole or any part of a computer system is capable of being accessed with
intent that it be used for the purpose of committing any of the offenses
under this Act.
(ii)
The possession of an item referred to in paragraphs 5(i)(aa) or (bb)
above with intent to use said devices for the purpose of committing any of
the offenses under this section.
(6)
Cyber-squatting. The acquisition of a domain name over the
internet in bad faith to profit, mislead, destroy reputation, and deprive
others from registering the same, if such a domain name is:
(i)
Similar, identical, or confusingly similar to an existing trademark
registered with the appropriate government agency at the time of the
domain name registration:
(ii)
Identical or in any way similar with the name of a person other
than the registrant, in case of a personal name; and
(iii)
(b)
Computer-related Offenses:
30
Opinion
(1)
Computer-related Forgery.
(i)
The input, alteration, or deletion of any computer data without
right resulting in inauthentic data with the intent that it be considered or
acted upon for legal purposes as if it were authentic, regardless whether or
not the data is directly readable and intelligible; or
(ii)
The act of knowingly using computer data which is the product of
computer-related forgery as defined herein, for the purpose of perpetuating
a fraudulent or dishonest design.
(2)
Computer-related Fraud. The unauthorized input, alteration, or
deletion of computer data or program or interference in the functioning of
a computer system, causing damage thereby with fraudulent intent:
Provided, That if no damage has yet been caused, the penalty imposable
shall be one (1) degree lower.
(3)
Computer-related Identity Theft. The intentional acquisition, use,
misuse, transfer, possession, alteration or deletion of identifying
information belonging to another, whether natural or juridical, without
right: Provided, That if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
(c)
Content-related Offenses:
(1)
Cybersex. The willful engagement, maintenance, control, or
operation, directly or indirectly, of any lascivious exhibition of sexual
organs or sexual activity, with the aid of a computer system, for favor or
consideration.
(2)
Child Pornography. The unlawful or prohibited acts defined and
punishable by Republic Act No. 9775 or the Anti-Child Pornography Act
of 2009, committed through a computer system: Provided, That the
penalty to be imposed shall be (1) one degree higher than that provided for
in Republic Act No. 9775.
(3)
Unsolicited Commercial Communications. The transmission of
commercial electronic communication with the use of computer system
which seek to advertise, sell, or offer for sale products and services are
prohibited unless:
(i)
(ii)
The primary intent of the communication is for service and/or
administrative announcements from the sender to its existing users,
subscribers or customers; or
(iii)
31
Opinion
(cc) The commercial electronic communication does not purposely
include misleading information in any part of the message in order to
induce the recipients to read the message.
(4)
Libel. The unlawful or prohibited acts of libel as defined in
Article 355 of the Revised Penal Code, as amended, committed through a
computer system or any other similar means which may be devised in the
future.
SEC. 5. Other Offenses. The following acts shall also constitute an
offense:
(a)
Aiding or Abetting in the Commission of Cybercrime. Any
person who willfully abets or aids in the commission of any of the
offenses enumerated in this Act shall be held liable.
(b)
Attempt in the Commission of Cybercrime. Any person who
willfully attempts to commit any of the offenses enumerated in this Act
shall be held liable.
II (G)
No Actual Controversy
The overview of the internet and the context of cyberspace regulation
should readily highlight the dangers of proceeding to rule on the
constitutional challenges presented by these consolidated petitions barren of
actual controversies. The platforms and technologies that move through an
ever expanding network of networks are varied. The activities of its users,
administrators, commercial vendors, and governments are also as complex
as they are varied.
The internet continues to grow. End User License Agreements
(EULA) of various applications may change its terms based on the feedback
of its users. Technology may progress to ensure that some of the fears that
amount to a violation of a constitutional right or privilege will be addressed.
Possibly, the violations, with new technologies, may become more intrusive
and malignant than jurisprudential cures that we can only imagine at present.
All these point to various reasons for judicial restraint as a natural
component of judicial review when there is no actual case. The courts
power is extraordinary and residual. That is, it should be invoked only
when private actors or other public instrumentalities fail to comply with
the law or the provisions of the Constitution. Our faith in deliberative
democracy requires that we presume that political forums are as
competent to read the Constitution as this court.
Also, the courts competence to deal with these issues needs to
evolve as we understand the context and detail of each technology
32
Opinion
implicated in acts that are alleged to violate law or the Constitution. The
internet is an environment, a phenomenon, a network of complex
relationships and, thus, a subject that cannot be fully grasped at first
instance. This is where adversarial positions with concrete contending
claims of rights violated or duties not exercised will become important.
Without the benefit of these adversarial presentations, the implications
and consequences of judicial pronouncements cannot be fully evaluated.
Finally, judicial economy and adjudicative pragmatism requires that
we stay our hand when the facts are not clear. Our pronouncements may
not be enough or may be too detailed. Parties might be required to
adjudicate again. Without an actual case, our pronouncements may also
be irrelevant to the technologies and relationships that really exist. This
will tend to undermine our own credibility as an institution.
We are possessed with none of the facts. We have no context of the
assertion of any right or the failure of any duty contained in the Constitution.
To borrow a meme that has now become popular in virtual environments:
We cannot be asked to doubt the application of provisions of law with most
of the facts in the cloud.
III
Limited Exception: Overbreadth Doctrine
There is, however, a limited instance where facial review of a statute
is not only allowed but essential: when the provision in question is so broad
that there is a clear and imminent threat that actually operates or it can be
used as a prior restraint of speech. This is when there can be an invalidation
of the statute on its face rather than as applied.
The use of the doctrine gained attention in this jurisdiction within a
separate opinion by Justice Mendoza in Cruz v. Secretary of Environment
and Natural Resources,134 thus:
The only instance where a facial challenge to a statute is
allowed is when it operates in the area of freedom of
expression. In such instance, the overbreadth doctrine permits a
party to challenge the validity of a statute even though as applied
to him it is not unconstitutional but it might be if applied to others
not before the Court whose activities are constitutionally protected.
Invalidation of the statute on its face rather than as applied is
permitted in the interest of preventing a chilling effect on
freedom of expression. But in other cases, even if it is found that a
provision of a statute is unconstitutional, courts will decree only
partial invalidity unless the invalid portion is so far inseparable
134
33
Opinion
from the rest of the statute that a declaration of partial invalidity is
not possible. 135 (Emphasis supplied)
135
See the Separate Opinion of Justice Mendoza in Cruz v. Secretary of Environment and Natural
Resources, 400 Phil. 904,1092 (2002) [Per Curiam, En Banc].
34
Opinion
In sum, the doctrines of strict scrutiny, overbreadth, and vagueness
are analytical tools developed for testing on their faces statutes
in free speech cases or, as they are called in American law, First
Amendment cases. They cannot be made to do service when what
is involved is a criminal statute. With respect to such statute, the
established rule is that one to whom application of a statute is
constitutional will not be heard to attack the statute on the ground
that impliedly it might also be taken as applying to other persons or
other situations in which its application might be unconstitutional.
As has been pointed out, vagueness challenges in the First
Amendment context, like overbreadth challenges typically produce
facial invalidation, while statutes found vague as a matter of due
process typically are invalidated [only] as applied to a particular
defendant.Consequently, there is no basis for petitioners claim
that this Court review the Anti-Plunder Law on its face and in its
entirety. 136
137
See the Concurring Opinion of Justice Mendoza in Estrada v. Sandiganbayan, 421 Phil. 290, 430-432
(2001) [Per J. Bellosillo, En Banc] citing Gooding v. Wilson, 405 U.S. 518, 521, 31 L.Ed.2d 408, 413
(1972); United States v. Salerno, 481 U.S. 739, 745, 95 L.Ed.2d 697, 707 (1987); People v. De la
Piedra, 403 Phil. 31 (2001); Broadrick v. Oklahoma, 413 U.S. 601, 612-613, 37 L. Ed. 2d 830, 840841 (1973); Village of Hoffman Estates v. Flipside, Hoffman Estates, Inc., 455 U.S. 489, 494-95, 71
L.Ed.2d 362, 369 (1982); United States v. Raines, 362 U.S. 17, 21, 4 L.Ed.2d 524, 529 (1960); Yazoo
& Mississippi Valley RR. v. Jackson Vinegar Co., 226 U.S. 217, 57 L.Ed. 193 (1912).
522 Phil. 705 (2006) [Per J. Sandoval-Gutierrez, En Banc].
35
Opinion
36
Opinion
law may be valid. Here, petitioners did not even attempt to show
whether this situation exists. 138 (Emphasis originally provided)
The Mendoza opinion, however, found its way back into the legal
spectrum when it was eventually adopted by this court in the cases of
Romualdez v. Sandiganbayan 139 and Romualdez v. Commission on
Elections. 140 Upon motion for reconsideration in Romualdez v. Commission
on Elections, 141 however, this court revised its earlier pronouncement that a
facial challenge only applies to free speech cases, thereby expanding its
scope and usage. It stated that:
x x x The rule established in our jurisdiction is, only statutes on
free speech, religious freedom, and other fundamental rights may
be facially challenged. Under no case may ordinary penal statutes
be subjected to a facial challenge. 142
139
140
141
142
143
David v. Arroyo, 522 Phil. 705 (2006) [Per J. Sandoval-Gutierrez, En Banc] citing the
Concurring Opinion of Justice Mendoza in Estrada v. Sandiganbayan, 421 Phil. 290, 430-432
(2001) [Per J. Bellosillo, En Banc]; Broadrick v. Oklahoma, 413 U.S. 601 (1973); Younger v. Harris,
401 U.S. 37, 52-53, 27 L.Ed.2d 669, 680 (1971); United States v. Raines, 362 U.S. 17, 4 L.Ed.2d 524
(1960); Board of Trustees, State Univ. of N.Y v. Fox, 492 U.S. 469, 106 L.Ed.2d 388 (1989).
479 Phil. 265 (2004) [Per J. Panganiban, En Banc].
576 Phil. 357 (2008) [Per J. Chico-Nazario, En Banc].
573 SCRA 639 (2008) [Per J. Chico-Nazario, En Banc].
Romualdez v. Commission on Elections, G.R. No. 167011, December 11, 2008, 573 SCRA 639, 645
[Per J. Chico-Nazario, En Banc].
G.R. No. 178552, October 5, 2010, 632 SCRA 146 [Per J. Carpio-Morales, En Banc].
37
Opinion
conduct. In fact, the legislature may even forbid and penalize acts
formerly considered innocent and lawful, so long as it refrains
from diminishing or dissuading the exercise of constitutionally
protected rights.
The Court reiterated that there are critical limitations by which a
criminal statute may be challenged and underscored that an onits-face invalidation of penal statutes x x x may not be allowed.
[T]he rule established in our jurisdiction is, only statutes on free speech,
religious freedom, and other fundamental rights may be facially
challenged. Under no case may ordinary penal statutes be subjected
to a facial challenge. The rationale is obvious. If a facial challenge to a
penal statute is permitted, the prosecution of crimes may be hampered.
No prosecution would be possible. A strong criticism against employing
a facial challenge in the case of penal statutes, if the same is allowed,
would effectively go against the grain of the doctrinal requirement of an
existing and concrete controversy before judicial power may be
appropriately exercised. A facial challenge against a penal statute is, at
best, amorphous and speculative. It would, essentially, force the court to
consider third parties who are not before it. As I have said in my
opposition to the allowance of a facial challenge to attack penal statutes,
such a test will impair the States ability to deal with crime. If warranted,
there would be nothing that can hinder an accused from defeating the
States power to prosecute on a mere showing that, as applied to third
parties, the penal statute is vague or overbroad, notwithstanding that the
law is clear as applied to him.
Southern Hemisphere Engagement Network, Inc. v. Anti-Terrorism Council, G.R. No. 178552, October
5, 2010, 632 SCRA 146, 186-189 [Per J. Carpio-Morales, En Banc], citing David v. Macapagal-
38
Opinion
III (A)
Test for Allowable Facial Review
In my view, the prevailing doctrine now is that a facial challenge
only applies to cases where the free speech and its cognates are asserted
before the court. While as a general rule penal statutes cannot be
subjected to facial attacks, a provision in a statute can be struck down as
unconstitutional when there is a clear showing that there is an imminent
possibility that its broad language will allow ordinary law enforcement to
cause prior restraints of speech and the value of that speech is such that its
absence will be socially irreparable.
Arroyo, 489 SCRA 160, 239 (2006) [Per J. Sandoval-Gutierrez, En Banc]; Romualdez v. Commission
on Elections, 573 SCRA 639 (2008) [Per J. Chico-Nazario, En Banc]; Estrada v. Sandiganbayan, Phil.
290 (2001) [Per J. Bellosillo, En Banc]; Consti., art. III, sec. 4; People v. Siton, 600 SCRA 476, 485
(2009) [Per J. Ynares-Santiago, En Banc]; Virginia v. Hicks, 539 U.S. 113, 156 L. Ed. 2d 148 (2003);
Gooding v. Wilson, 405 U.S. 518, 31 L. Ed 2d 408 (1972).
39
Opinion
III (B)
Reason for the Doctrine
The reason for this exception can be easily discerned.
40
Opinion
merely in the periodic establishment of the government through
their suffrage but also in the administration of public affairs as well
as in the discipline of abusive public officers. The citizen is
accorded these rights so that he can appeal to the appropriate
governmental officers or agencies for redress and protection as
well as for the imposition of the lawful sanctions on erring public
officers and employees.
(5) While the Bill of Rights also protects property rights, the
primacy of human rights over property rights is recognized.
Because these freedoms are "delicate and vulnerable, as well as
supremely precious in our society" and the "threat of sanctions
may deter their exercise almost as potently as the actual application
of sanctions," they "need breathing space to survive," permitting
government regulation only "with narrow specificity."
Property and property rights can be lost thru prescription; but
human rights are imprescriptible. If human rights are extinguished
by the passage of time, then the Bill of Rights is a useless attempt
to limit the power of government and ceases to be an efficacious
shield against the tyranny of officials, of majorities, of the
influential and powerful, and of oligarchs political, economic or
otherwise.
In the hierarchy of civil liberties, the rights of free expression and
of assembly occupy a preferred position as they are essential to the
preservation and vitality of our civil and political institutions; and
such priority "gives these liberties the sanctity and the sanction not
permitting dubious intrusions."
The superiority of these freedoms over property rights is
underscored by the fact that a mere reasonable or rational relation
between the means employed by the law and its object or purpose
that the law is neither arbitrary nor discriminatory nor
oppressive would suffice to validate a law which restricts or
impairs property rights. On the other hand, a constitutional or valid
infringement of human rights requires a more stringent criterion,
namely existence of a grave and immediate danger of a substantive
evil which the State has the right to prevent. 146 (Citations omitted)
The power of the State is derived from the authority and mandate
given to it by the people, through their representatives elected in the
146
Philippine Blooming Mills Employment Organization et al v. Philippine Blooming Mills, Co. Inc., 151A Phil. 656, 674-676 (1973) [Per J. Makasiar, En Banc].
41
Opinion
42
Opinion
and is not confined to any particular field of human interest. The
protection covers myriad matters of public interest or concern
embracing all issues, about which information is needed or
appropriate, so as to enable members of society to cope with the
exigencies of their period. The constitutional protection assures the
broadest possible exercise of free speech and free press for
religious, political, economic, scientific, news, or informational
ends, inasmuch as the Constitution's basic guarantee of freedom to
advocate ideas is not confined to the expression of ideas that are
conventional or shared by a majority.
The constitutional protection is not limited to the exposition of
ideas. The protection afforded free speech extends to speech or
publications that are entertaining as well as instructive or
informative. Specifically, in Eastern Broadcasting Corporation
(DYRE) v. Dans, this Court stated that all forms of media, whether
print or broadcast, are entitled to the broad protection of the clause
on freedom of speech and of expression. (Citations omitted) 148
III (C)
Overbreadth versus Vagueness
A facial challenge, however, can only be raised on the basis of
overbreadth, not vagueness. Vagueness relates to a violation of the rights of
due process. A facial challenge, on the other hand, can only be raised on the
basis of overbreadth, which affects freedom of expression.
Southern Hemisphere provided the necessary distinction:
A statute or act suffers from the defect of vagueness when
it lacks comprehensible standards that men of common intelligence
must necessarily guess at its meaning and differ as to its
application. It is repugnant to the Constitution in two respects: (1)
it violates due process for failure to accord persons, especially the
parties targeted by it, fair notice of the conduct to avoid; and (2) it
leaves law enforcers unbridled discretion in carrying out its
provisions and becomes an arbitrary flexing of the Government
muscle. The overbreadth doctrine, meanwhile, decrees that a
governmental purpose to control or prevent activities
constitutionally subject to state regulations may not be achieved by
means which sweep unnecessarily broadly and thereby invade the
area of protected freedoms.
As distinguished from the vagueness doctrine, the
overbreadth doctrine assumes that individuals will understand what
a statute prohibits and will accordingly refrain from that behavior,
even though some of it is protected. 149
148
149
Chavez v. Gonzales, 569 Phil. 155, 197-198 (2008) [Per C.J. Puno, En Banc].
Southern Hemisphere Engagement Network, Inc. v. Anti-Terrorism Council, G.R. No. 178552, October
5, 2010, 632 SCRA 146, 185 [Per J. Carpio-Morales, En Banc].
43
Opinion
150
151
44
Opinion
45
Opinion
313. It makes no difference that the instant case was not a criminal
prosecution, and not based on a refusal to comply with a licensing
requirement. The objectionable quality of vagueness and
overbreadth does not depend upon absence of fair notice to a
criminally accused or upon unchanneled delegation of
legislative powers, but upon the danger of tolerating, in the
area of First Amendment freedoms, the existence of a penal
statute susceptible of sweeping and improper application.
Marcus v. Search Warrant, 367 U. S. 717, 367 U. S. 733. These
freedoms are delicate and vulnerable, as well as supremely
precious in our society. The threat of sanctions may deter their
exercise almost as potently as the actual application of
sanctions. Cf. Smith v. California, supra, at 361 U. S. 151-154;
Speiser v. Randall, 357 U. S. 513, 357 U. S. 526. Because First
Amendment freedoms need breathing space to survive,
government may regulate in the area only with narrow specificity.
Cantwell v. Connecticut, 310 U. S. 296, 3 310 U. S. 11. (Emphasis
supplied) 155
National Association for the Advancement of Colored People v. Button, 371 U.S. 415, 431-433 (1963).
569 Phil. 155 (2008) [Per C.J. Puno, En Banc].
46
Opinion
but to uphold the exercise of free speech and free press. There is no
showing that the feared violation of the anti-wiretapping law
clearly endangers the national security of the State.
This is not all the faultline in the stance of the respondents.
We slide to the issue of whether the mere press statements of the
Secretary of Justice and of the NTC in question constitute a form
of content-based prior restraint that has transgressed the
Constitution. In resolving this issue, we hold that it is not decisive
that the press statements made by respondents were not
reduced in or followed up with formal orders or circulars. It is
sufficient that the press statements were made by respondents
while in the exercise of their official functions. Undoubtedly,
respondent Gonzales made his statements as Secretary of Justice,
while the NTC issued its statement as the regulatory body of
media. Any act done, such as a speech uttered, for and on
behalf of the government in an official capacity is covered by
the rule on prior restraint. The concept of an act does not
limit itself to acts already converted to a formal order or
official circular. Otherwise, the non formalization of an act
into an official order or circular will result in the easy
circumvention of the prohibition on prior restraint. The press
statements at bar are acts that should be struck down as they
constitute impermissible forms of prior restraints on the right to
free speech and press.
There is enough evidence of chilling effect of the
complained acts on record. The warnings given to media came
from no less the NTC, a regulatory agency that can cancel the
Certificate of Authority of the radio and broadcast media. They
also came from the Secretary of Justice, the alter ego of the
Executive, who wields the awesome power to prosecute those
perceived to be violating the laws of the land. After the warnings,
the KBP inexplicably joined the NTC in issuing an ambivalent
Joint Press Statement. After the warnings, petitioner Chavez was
left alone to fight this battle for freedom of speech and of the press.
This silence on the sidelines on the part of some media
practitioners is too deafening to be the subject of misinterpretation.
The constitutional imperative for us to strike down
unconstitutional acts should always be exercised with care and in
light of the distinct facts of each case. For there are no hard and
fast rules when it comes to slippery constitutional questions, and
the limits and construct of relative freedoms are never set in stone.
Issues revolving on their construct must be decided on a case to
case basis, always based on the peculiar shapes and shadows of
each case. But in cases where the challenged acts are patent
invasions of a constitutionally protected right, we should be swift
in striking them down as nullities per se. A blow too soon struck
for freedom is preferred than a blow too late. 157
Chavez v. Gonzales, 569 Phil. 155, 219-221 (2008) [Per C.J. Puno, En Banc].
47
Opinion
alone,
these
provisions
and
clauses
are
IV
The Take Down Clause
Section 19 of Republic Act No. 10175 is unconstitutional because it
clearly allows prior restraint. This section provides:
SEC. 19. Restricting or Blocking Access to Computer Data
When a computer data is prima facie found to be in violation of the
provisions of this Act, the DOJ shall issue an order to restrict or
block access to such computer data.
Among all the provisions, this is the sole provision that the Office of
the Solicitor General agrees to be declared as unconstitutional.
IV (A)
A Paradigmatic Example of Prior Restraint
There is no doubt of the chilling effect of Section 19 of Republic
Act No. 10175. It is indeed an example of an instance when law enforcers
are clearly invited to do prior restraints within vague parameters. It is
blatantlyunconstitutional.
Chavez v. Gonzales presents a clear and concise summary of the
doctrines governing prior restraint:
Prior restraint refers to official governmental restrictions on the
press or other forms of expression in advance of actual publication
48
Opinion
or dissemination. Freedom from prior restraint is largely freedom
from government censorship of publications, whatever the form of
censorship, and regardless of whether it is wielded by the
executive, legislative or judicial branch of the government. Thus, it
precludes governmental acts that required approval of a proposal to
publish; licensing or permits as prerequisites to publication
including the payment of license taxes for the privilege to publish;
and even injunctions against publication. Even the closure of the
business and printing offices of certain newspapers, resulting in the
discontinuation of their printing and publication, are deemed as
previous restraint or censorship. Any law or official that requires
some form of permission to be had before publication can be made,
commits an infringement of the constitutional right, and remedy
can be had at the courts.
Given that deeply ensconced in our fundamental law is the hostility
against all prior restraints on speech, and any act that restrains
speech is presumed invalid, and "any act that restrains speech is
hobbled by the presumption of invalidity and should be greeted
with furrowed brows," it is important to stress not all prior
restraints on speech are invalid. Certain previous restraints may
be permitted by the Constitution, but determined only upon a
careful evaluation of the challenged act as against the appropriate
test by which it should be measured against.
49
Opinion
through a computer system or any other similar means which may
be devised in the future.
50
Opinion
51
Opinion
52
Opinion
malicious defamation. The law punishes a malicious defamation
and it was not intended to permit one to maliciously injure
another under the garb of "justifiable motives." When malice
in fact is shown to exist the publisher can not be relieved from
liability by a pretense of "justifiable motives." Section 3
relieves the plaintiff from the necessity of proving malice
simply when no justifiable motives are shown, but it does not
relieve the defendant from liability under the guise of
"justifiable motives" when malice actually is proved. The
defense of "the truth" of the "injurious publication" (sec. 4) and its
character as a privileged communication (sec. 9) means nothing
more than the truth in one instance and the occasion of making it in
the other together with proof of justifiable motive, rebuts the prima
facie inference of malice in law and throws upon the plaintiff or
the State, the onus of proving malice in fact. The publication of a
malicious defamation, whether it be true or not, is clearly an
offense under Act No. 277. 161 (Emphasis supplied)
164
165
166
53
Opinion
The maintenance of the opportunity for free political
discussion to the end that government may be responsive to the
will of the people and that changes may be obtained by lawful
means, an opportunity essential to the security of the Republic,
is a fundamental principle of our constitutional system.
xxxx
Injury to official reputation affords no more warrant
for repressing speech that would otherwise be free than does
factual error. Where judicial officers are involved, this Court
has held that concern for the dignity and reputation of the
courts does not justify the punishment as criminal contempt of
criticism of the judge or his decision. Bridges v. California, 314
U.S. 252.This is true even though the utterance contains "halftruths" and "misinformation." Pennekamp v. Florida, 328 U.S.
331, 342, 343, n. 5, 345. Such repression can be justified, if at all,
only by a clear and present danger of the obstruction of justice. See
also Craig v. Harney, 331 U.S. 367; Wood v. Georgia, 370 U.S.
375. If judges are to be treated as "men of fortitude, able to thrive
in a hardy climate," Craig v. Harney, supra, 331 U.S. at 376, surely
the same must be true of other government officials, such as
elected city commissioners. Criticism of their official conduct
does not lose its constitutional protection merely because it is
effective criticism, and hence diminishes their official
reputations. Stromberg v. California, 283 U.S. 359, 369. 167
(Emphasis supplied)
Ayer Productions Pty. Ltd and McElroy & McElroy Film Productions
v. Hon. Ignacio M. Capulong, 168 as affirmed in the case of Borjal v. Court of
Appeals, 169 adopted the doctrine in New York Times to public figures. In
Ayer Productions:
A limited intrusion into a person's privacy has long been regarded
as permissible where that person is a public figure and the
information sought to be elicited from him or to be published about
him constitute of a public character. Succinctly put, the right of
privacy cannot be invoked resist publication and dissemination of
matters of public interest. The interest sought to be protected by
the right of privacy is the right to be free from unwarranted
publicity, from the wrongful publicizing of the private affairs and
activities of an individual which are outside the realm of legitimate
public concern. 170
167
168
169
170
Id. at 269-273.
243 Phil. 1007 (1988) [Per J. Feliciano, En Banc].
361 Phil. 1 (1999) [Per J. Bellosillo, Second Division].
Ayer Productions Pty. Ltd and McElroy & McElroy Film Productions v. Hon. Ignacio M. Capulong,
243 Phil. 1007, 1018-1019 (1988) [Per J. Feliciano, En Banc].
54
Opinion
A public figure has been defined as a person who, by his
accomplishments, fame, or mode of living, or by adopting a
profession or calling which gives the public a legitimate interest
in his doings, his affairs, and his character, has become a 'public
personage.' He is, in other words, a celebrity. Obviously to be
included in this category are those who have achieved some degree
of reputation by appearing before the public, as in the case of an
actor, a professional baseball player, a pugilist, or any other
entertainment. The list is, however, broader than this. It includes
public officers, famous inventors and explorers, war heroes and
even ordinary soldiers, an infant prodigy, and no less a personage
than the Grand Exalted Ruler of a lodge. It includes, in short,
anyone who has arrived at a position where public attention is
focused upon him as a person.
Such public figures were held to have lost, to some extent at
least, their tight to privacy. Three reasons were given, more or less
indiscriminately, in the decisions" that they had sought publicity
and consented to it, and so could not complaint when they received
it; that their personalities and their affairs has already public, and
could no longer be regarded as their own private business; and
that the press had a privilege, under the Constitution, to inform the
public about those who have become legitimate matters of public
interest. On one or another of these grounds, and sometimes all, it
was held that there was no liability when they were given
additional publicity, as to matters legitimately within the scope of
the public interest they had aroused.
The privilege of giving publicity to news, and other matters
of public interest, was held to arise out of the desire and the right
of the public to know what is going on in the world, and the
freedom of the press and other agencies of information to tell it.
"News" includes all events and items of information which are out
of the ordinary hum-drum routine, and which have 'that indefinable
quality of information which arouses public attention.' To a very
great extent the press, with its experience or instinct as to what its
readers will want, has succeeded in making its own definition of
news, as a glance at any morning newspaper will sufficiently
indicate. It includes homicide and other crimes, arrests and police
raids, suicides, marriages and divorces, accidents, a death from the
use of narcotics, a woman with a rare disease, the birth of a child to
a twelve year old girl, the reappearance of one supposed to have
been murdered years ago, and undoubtedly many other similar
matters of genuine, if more or less deplorable, popular appeal.
The privilege of enlightening the public was not, however,
limited, to the dissemination of news in the scene of current events.
It extended also to information or education, or even entertainment
and amusement, by books, articles, pictures, films and broadcasts
concerning interesting phases of human activity in general, as well
as the reproduction of the public scene in newsreels and
travelogues. In determining where to draw the line, the courts were
invited to exercise a species of censorship over what the public
55
Opinion
may be permitted to read; and they were understandably liberal in
allowing the benefit of the doubt. 171 (Emphasis supplied)
172
Id. at 1023-1024, citing Professors William Lloyd Prosser and W. Page Keeton, Prosser and Keeton on
Torts, 5th ed. at 859861 (1984).
373 Phil. 238 (1999) [Per J. Mendoza, En Banc].
56
Opinion
their duties as members of a self-governing community. Without
free speech and assembly, discussions of our most abiding
concerns as a nation would be stifled. As Justice Brandeis has said,
public discussion is a political duty and the greatest menace to
freedom is an inert people. 173 (Emphasis supplied)
Id. at 250-255.
508 Phil. 193 (2005) [Per J. Tinga, Second Division].
Id. at 221-222.
G.R. No. 164437, May 15, 2009, 588 SCRA 1 [Per J. Quisumbing, Second Division].
Villanueva v. Philippine Daily Inquirer, Inc., G.R. No. 164437, May 15, 2009, 588 SCRA 1, 15 [Per J.
Quisumbing, Second Division].
57
Opinion
V (D)
Overbreadth by Reenactment
With the definite evolution of jurisprudence to accommodate free
speech values, it is clear that the reenactment of the old text of libel is now
unconstitutional. Articles 353, 354, and 355 of the Revised Penal Code
and by reference, Section 4(c)4 of the law in question are now
overbroad as it prescribes a definition and presumption that have been
repeatedly struck down by this court for several decades.
A statute falls under the overbreadth doctrine when a governmental
purpose may not be achieved by means which sweep unnecessarily broadly
and thereby invade the area of protected freedoms. 178 Section 4(c)(4) of
Rep. Act No. 10175 and Articles 353, 354, and 355 produce a chilling effect
on speech by being fatally inconsistent with Ayer Productions as well as by
imposing criminal liability in addition to civil ones. Not only once, but
several times, did this court uphold the freedom of speech and expression
under Article III, Section 4 of the 1987 Constitution 179 over an alleged
infringement of privacy or defamation. This trend implies an evolving
rejection of the criminal nature of libel and must be expressly recognized in
view of this courts duty to uphold the guarantees under the Constitution.
The threat to freedom of speech and the publics participation in
matters of general public interest is greater than any satisfaction from
imprisonment of one who has allegedly malicious[ly] imput[ed] x x x a
crime, or x x x a vice or defect, real or imaginary, or any act, omission,
condition, status, or circumstance tending to cause the dishonor, discredit, or
contempt of a natural or juridical person, or xxx blacken[ed] the memory of
[the] dead. 180 The law provides for other means of preventing abuse and
unwarranted attacks on the reputation or credibility of a private person.
Among others, this remedy is granted under the Chapter on Human
Relations in the Civil Code, particularly Articles 19, 181 20, 182 21, 183 and even
26. 184 There is, thus, no cogent reason that a penal statute would
178
179
180
181
182
183
184
Estrada v. Sandiganbayan, 421 Phil. 290, 353 (2001) [Per J. Bellosillo, En Banc] citing NAACP v.
Alabama, 377 U.S. 288, 307, 12 L.Ed.2d 325, 338 (1958); Shelton v. Tucker, 364 U.S. 479, 5 L.Ed.2d
231 (1960).
Sec. 4. No law shall be passed abridging the freedom of speech, of expression, or of the press, or the
right of the people peaceably to assemble and petition the government for redress of grievances.
Revised Penal Code, Art. 353.
Art. 19. Every person must, in the exercise of his rights and in the performance of his duties, act with
justice, give everyone his due, and observe honesty and good faith.
Art. 20. Every person who, contrary to law, wilfully or negligently causes damage to another, shall
indemnify the latter for the same.
Art. 21. Any person who wilfully causes loss or injury to another in manner that is contrary to morals,
good customs or public policy shall compensate the latter for the damage.
Art. 26. Every person shall respect the dignity, personality, privacy and peace of mind of his neighbors
and other persons. The following and similar acts, though they may not constitute a criminal offense,
shall produce a cause of action for damages, prevention and other relief:
58
Opinion
185
186
See also Justice Carpios dissenting opinion in MVRS Publications, Inc., v. Islamic Dawah Council of
the Philippines, Inc., 444 Phil. 230 (2004) [Per J. Bellosillo, En Banc]. Justice Carpio was of the view
that the defamatory article published in the case fell under Article 26 of the Civil Code.
See Tucker, C. and A. Matthews, Social Networks, Advertising and Antitrust, in GEORGE MASON LAW
REVIEW, 19 Geo. Mason L. Rev. 1211, 1214.
See < http://www2.uncp.edu/home/acurtis/NewMedia/SocialMedia/SocialMediaHistory.html> (visited
February 19, 2014).
59
Opinion
send real-time exchanges through the network. This led to the prevalence of
instant messaging applications such as ICQ and online chatrooms such as
mIRC. 187 In 1999, British website Friends Reunited was the first popular
online hub whose primary purpose was to allow users to interact and
reconnect with former classmates through the internet. 188 Friendster,
launched in 2002, became one the first and largest online social networking
sites, reaching up to 117 million users before its decline. 189 The site was
dedicated to connecting with as many people as possible, without a need for
prior physical contact or established relationships. MySpace, another social
networking site launched in 2003, garnered more visitors than popular
search engine sites Google and Yahoo in 2006. 190 These online social
networking sites have had several popular iterations such as Multiply,
LiveJournal or Blogger, which serve as venues for individuals who wish to
post individual journal entries, photographs or videos.
Today, the most popular social networking sites are Facebook and
Twitter. Facebook, which was initially known as Facesmash for exclusive
use of Harvard University students and alumni, began in 2003. Eventually,
Facebook became the most prevalent and ubiquitous online social
networking site, with some 750 million users worldwide, as of July 2011. 191
Twitter gained popularity immediately after its founding in 2006. It
gained prominence by positioning itself as a real-time information network
while allowing ease of access and immediate sharing to an expanding set of
users. To date, Twitter has about 750 million registered users, with about
200 million users making use of the platform on a regular basis. 192 In its
latest initial public offering, Twitter disclosed that there are over 500 million
tweets (messages with a140-character limit) made in a day. 193
The most recent social networking phenomenon is Instagram, which
was launched in October 2010. This application allows instantaneous
sharing of photographs especially through smartphones. Today, Instagram
has 150 million active users and with over 1.5 billion likes of photos
shared on the network every day. 194
187
188
189
190
191
192
193
194
60
Opinion
61
Opinion
limits will not be clear to the speaker or writer. Hence, they will then limit
their expression or stifle the sharing of their ideas. They are definite victims
of the chilling effect of the vagueness of the provisions in question.
The problem becomes compounded with messages that are reposted
with or without comment. The following tweets are examples which will
provide the heuristic to understand the problem:
Form A: @marvicleonen: RT @somebody: Juan is a liar,
a thief and an idiot #thetruth
Form B: @marvicleonen: This! RT @somebody: Juan is a
liar, a thief and an idiot #thetruth
Both are posts from a user with the handle @marvicleonen. RT means
that the following message was only reposted (retweeted), and the hashtag
#thetruth is simply a way of categorizing ones messages. The hashtag itself
may also contain speech elements.
Form A is a simple repost. The reasons for reposting are ambiguous.
Since reposting is only a matter of a click of a button, it could be that it was
done without a lot of deliberation. It is also possible that the user agreed with
the message and wanted his network to know of his agreement. It is possible
that the user also wanted his network to understand and accept the message.
Form B is a repost with a comment This!. While it may be clearer
that there is some deliberation in the intent to share, it is not clear whether
this is an endorsement of the statement or simply sarcasm. This form is not
part of the categorization proposed by the ponencia.
There are other permutations as there are new platforms that continue
to emerge. Viber and WhatsApp for instance now enable SMS users to
create their own network.
There are other problems created by such broad law in the internet.
The network made by the original author may only be of real friends of
about 10 people. The network where his or her post was shared might
consist of a thousand participants. Again, the current law on libel fails to
take these problems of context into consideration.
A post, comment or status message regarding government or a public
figure has the tendency to be shared. It easily becomes viral. After all,
there will be more interest among those who use the internet with messages
that involve issues that are common to them or are about people that are
known to themusually public officers and public figures. When the
62
Opinion
63
Opinion
V (F)
No State Interest in Criminalizing Libel
The kinds of speech that are actually deterred by libel law are more
valuable than the state interest that is sought to be protected by the crime.
Besides, there are less draconian alternatives which have very minimal
impact on the publics fundamental right of expression. Civil actions for
defamation do not threaten the publics fundamental right to free speech.
They narrow its availability such that there is no unnecessary chilling effect
on criticisms of public officials or policy. They also place the proper
economic burden on the complainant and, therefore, reduce the possibility
that they be used as tools to harass or silence dissenters.
The purposes of criminalizing libel come to better light when we
review its history. This court has had the opportunity to trace its historical
development. Guingguing v. Court of Appeals 195 narrated:
Originally, the truth of a defamatory imputation was not
considered a defense in the prosecution for libel. In the landmark
opinion of England's Star Chamber in the Libelis Famosis case in
1603, two major propositions in the prosecution of defamatory
remarks were established: first, that libel against a public person is
a greater offense than one directed against an ordinary man, and
second, that it is immaterial that the libel be true. These
propositions were due to the fact that the law of defamatory libel
was developed under the common law to help government
protect itself from criticism and to provide an outlet for
individuals to defend their honor and reputation so they would
not resort to taking the law into their own hands.
Our understanding of criminal libel changed in 1735 with
the trial and acquittal of John Peter Zenger for seditious libel in the
then English colony of New York. Zenger, the publisher of the
New-York Weekly Journal, had been charged with seditious libel,
for his papers consistent attacks against Colonel William Cosby,
the Royal Governor of New York. In his defense, Zengers
counsel, Andrew Hamilton, argued that the criticisms against
Governor Cosby were the right of every free-born subject to
make when the matters so published can be supported with
truth. The jury, by acquitting Zenger, acknowledged albeit
unofficially the defense of truth in a libel action. The Zenger case
also laid to rest the idea that public officials were immune from
criticism.
The Zenger case is crucial, not only to the evolution of the
doctrine of criminal libel, but also to the emergence of the
American democratic ideal. It has been characterized as the first
landmark in the tradition of a free press, then a somewhat radical
notion that eventually evolved into the First Amendment in the
195
Guingguing v. Court of Appeals, 508 Phil. 193 (2005) [Per J. Tinga, Second Division].
64
Opinion
American Bill of Rights and also proved an essential weapon in the
war of words that led into the American War for Independence.
Yet even in the young American state, the government paid
less than ideal fealty to the proposition that Congress shall pass no
law abridging the freedom of speech. The notorious Alien and
Sedition Acts of 1798 made it a crime for any person who, by
writing, speaking or printing, should threaten an officer of the
government with damage to his character, person, or estate. The
law was passed at the insistence of President John Adams, whose
Federalist Party had held a majority in Congress, and who had
faced persistent criticism from political opponents belonging to the
Jeffersonian Republican Party. As a result, at least twenty-five
people, mostly Jeffersonian Republican editors, were arrested
under the law. The Acts were never challenged before the U.S.
Supreme Court, but they were not subsequently renewed upon their
expiration.
The massive unpopularity of the Alien and Sedition Acts
contributed to the electoral defeat of President Adams in 1800. In
his stead was elected Thomas Jefferson, a man who once famously
opined, Were it left to me to decide whether we should have a
government without newspapers, or newspapers without a
government, I should not hesitate a moment to prefer the latter. 196
It was in that case where the court noted the history of early American
media that focused on a mad dog rhetoric approach. This, in turn, led the
court to conclude that [t]hese observations are important in light of the
misconception that freedom of expression extends only to polite, temperate,
or reasoned expression. x x x Evidently, the First Amendment was designed
to protect expression even at its most rambunctious and vitriolic form as it
had prevalently taken during the time the clause was enacted. 197
The case that has defined our understanding of the concept of modern
libel the New York Times Co. v. Sullivan 198 then followed. As discussed
earlier, the New York Times case required proof of actual malice when a case
for defamation includes matters of public concern, public men, and
candidates for office. 199
The cases of Garrison v. Louisiana, and Curtis Publishing Co. v.
Butts both expanded the New York Times actual malice test to public
officials and public figures, respectively. 200
196
197
198
199
200
Guingguing v. Court of Appeals, 508 Phil. 193, 204-206 (2005) [Per J. Tinga, Second Division], citing
New York Times v. Sullivan, 376 U.S. 254, 300-301(1964).
Id. at 207.
376 U.S. 254 (1964).
New York Times v. Sullivan, 376 U.S. 254, 281-282 (1964).
See Guingguing v. Court of Appeals, 508 Phil. 193, 209-211 (2005) [Per J. Tinga, Second Division],
citing Garrison v. Louisiana, 379 U.S. 64 (1964) and Curtis Publishing Co. v. Butts, 388 U.S. 130,
163-164 (1967), CJ Warren, concurring.
65
Opinion
206
66
Opinion
private parties before the Supreme Court are sparse. 207 Dean Raul
Pangalangan, former dean of the University of the Philippines College of
Law and now publisher of the Philippine Daily Inquirer, observed that libel
cases are pursued to their conclusion mainly by public figures, x x x [since
those filed] by private persons are settled amicably before the prosecutor. 208
Among the cases that reached the Supreme Court were those involving
offended parties who were electoral candidates, 209 ambassadors and business
tycoons, 210 lawyers, 211 actors or celebrities, 212 corporations, 213 and, public
officers. 214 Even court officials have been involved as complainants in libel
cases. 215
This attests to the propensity to use the advantages of criminal libel by
those who are powerful and influential to silence their critics. Without doubt,
the continuous evolution and reiteration of the jurisprudential limitations in
the interpretation of criminal libel as currently worded has not been a
deterrent. The present law on libel as reenacted by Section 4(c)(4) of Rep.
Act No. 10175 will certainly do little to shield protected speech. This is clear
because there has been no improvement in statutory text from its version in
1930.
207
208
209
210
211
212
213
214
215
See Magno v. People, 516 Phil. 72 (2006) [Per J. Garcia, Second Division]; See also MVRS
Publications, Inc. v. Islamic Dawah Council of the Philippines, Inc., 444 Phil. 230 (2004) [Per J.
Bellosillo, En Banc]; Villamar-Sandoval v. Cailipan, G.R. No. 200727, March 4, 2013, 692 SCRA 339
(2013) [Per J. Perlas-Bernabe, Second Division].
R. Pangalangan, Libel as Politics, in LIBEL AS POLITICS 11 (2008). Note, however, our ruling in
Crespo v. Mogul, 235 Phil. 465 (1987), where we said that, it is the duty of the fiscal to proceed with
the presentation of evidence of the prosecution to the Court to enable the Court to arrive at its own
independent judgment as to whether the accused should be convicted or acquitted. x x x The rule
therefore in this jurisdiction is that once a complaint or information is filed in Court any disposition of
the case as its dismissal or the conviction or acquittal of the accused rests in the sound discretion of the
Court.
See Brillante v. Court of Appeals, 483 Phil. 568 (2004) [Per J. Tinga, Second Division]; Villanueva v.
Philippine Daily Inquirer, Inc., G.R. No. 164437, May 15, 2009, 588 SCRA 1 [Per J. Quisumbing,
Second Division].
See Yuchengco v. Manila Chronicle Publishing Corporation, G.R. No. 184315, November 25, 2009,
605 SCRA 684 [Per J. Chico-Nazario, Third Division]; Bonifacio v. Regional Trial Court of Makati,
Branch 149, G.R. No. 184800, May 5, 2010, 620 SCRA 268 [Per J. Carpio-Morales, First Division].
This case involved allegedly libelous articles published in websites.
See Buatis v. People, 520 Phil. 149 (2006) [Per J. Austria-Martinez, First Division]; See also Tulfo v.
People, 587 Phil. 64 (2008) [Per J. Velasco, Jr., Second Division]; and Fortun v. Quinsayas, G.R. No.
194578, February 13, 2013, 690 SCRA 623 [Per J. Carpio, Second Division]. This case originated as a
special civil action for contempt involving Atty. Sigfrid A. Fortun and several media outfits. However,
this court expanded the concept of public figures to lawyers, stating that lawyers of high-profile cases
involving public concern become public figures.
See Fermin v. People, G.R. No. 157643, March 28, 2008, 550 SCRA 132 [Per J. Nachura, Third
Division]; Bautista v. Cuneta-Pangilinan, G.R. No. 189754, October 24, 2012, 684 SCRA 521 [Per J.
Peralta, Third Division].
See Banal III v. Panganiban, 511 Phil. 605 (2005) [Per J. Ynares-Santiago, First Division]. See also
Insular Life Assurance Company, Limited v. Serrano, 552 Phil. 469 (2007) [Per C.J. Puno, First
Division].
See Lagaya v. People, G.R. No. 176251, July 25, 2012, 677 SCRA 478 [Per J. Del Castillo, First
Division]; Lopez v. People, G.R. No. 172203, February 14, 2011 642 SCRA 668 [Per J. Del Castillo,
First Division]; Binay v. Secretary of Justice, 532 Phil. 742 (2006) [Per J. Ynares-Santiago, First
Division]; See also Jalandoni v. Drilon, 383 Phil. 855 (2000) [Per J. Buena, Second Division];
Macasaet v. Co, Jr., G.R. No. 156759, June 5, 2013, 697 SCRA 187; Tulfo v. People, 587 Phil. 64
(2008) [Per J. Velasco, Jr., Second Division].
See Yambot v. Tuquero, G.R. No. 169895, March 23, 2011, 646 SCRA 249 [Per J. Leonardo-De
Castro, First Division].
67
Opinion
Libel law now is used not so much to prosecute but to deter speech.
What is charged as criminal libel may contain precious protected speech.
There is very little to support the view of the majority that the law will not
continue to have this effect on speech.
This court has adopted the American case of Garrison v. Louisiana,
albeit qualifiedly, in recognizing that there is an international trend in
diminishing the scope, if not the viability, of criminal libel prosecutions. 216
Garrison struck down the Louisiana Criminal Defamation Statute and held
that the statute incorporated constitutionally invalid standards when it came
to criticizing or commenting on the official conduct of public officials.
It is time that we now go further and declare libel, as provided in the
Revised Penal Code and in the Cybercrime Prevention Act of 2012, as
unconstitutional.
This does not mean that abuse and unwarranted attacks on the
reputation or credibility of a private person will not be legally addressed.
The legal remedy is civil in nature and granted in provisions such as the
Chapter on Human Relations in the Civil Code, particularly Articles 19, 20,
and 21. 217 These articles provide:
Art. 19. Every person must, in the exercise of his rights and in the
performance of his duties, act with justice, give everyone his due,
and observe honesty and good faith.
216
Guingguing v. Court of Appeals, 508 Phil. 193, 214 (2005), citing Garrison, 379 U.S. 64 (1964). This
court in Guingguing said that:
Lest the impression be laid that criminal libel law was rendered extinct in regards to
public officials, the Court made this important qualification in Garrison:
217
The use of calculated falsehood, however, would put a different cast on the
constitutional question. Although honest utterance, even if inaccurate, may further the
fruitful exercise of the right of free speech, it does not follow that the lie, knowingly and
deliberately published about a public official, should enjoy a like immunity. At the time
the First Amendment was adopted, as today, there were those unscrupulous enough and
skillful enough to use the deliberate or reckless falsehood as an effective political tool to
unseat the public servant or even topple an administration. That speech is used as a tool
for political ends does not automatically bring it under the protective mantle of the
Constitution. For the use of the known lie as a tool is at once with odds with the premises
of democratic government and with the orderly manner in which economic, social, or
political change is to be effected.
See also Justice Carpios dissenting opinion in MVRS Publications, Inc. v. Islamic Dawah Council of
the Philippines, Inc. 444 Phil. 230 (2004) [Per J. Bellosillo, En Banc] where he opined that the
defamatory article published in the case falls under Article 26 of the Civil Code.
Article 26. Every person shall respect the dignity, personality, privacy and peace of mind of his
neighbors and other persons. The following and similar acts, though they may not constitute a criminal
offense, shall produce a cause of action for damages, prevention and other relief:
(1) Prying into the privacy of another's residence;
(2) Meddling with or disturbing the private life or family relations of another;
(3) Intriguing to cause another to be alienated from his friends;
(4) Vexing or humiliating another on account of his religious beliefs, lowly station in life, place of
birth, physical defect, or other personal condition.
68
Opinion
69
Opinion
While the Court has not hesitated to apply Article 19 whether the
legal and factual circumstances called for its application [See for
e.g., Velayo v. Shell Co. of the Phil., Ltd., 100 Phil. 186 (1956);
PNB v. CA, supra; Grand Union Supermarket, Inc. v. Espino, Jr.,
G.R. No. L-48250, December 28, 1979, 94 SCRA 953; PAL v.
CA, G.R. No. L-46558, July 31, 1981,106 SCRA 391; United
General Industries, Inc, v. Paler G.R. No. L-30205, March
15,1982,112 SCRA 404; Rubio v. CA, G.R. No. 50911, August 21,
1987, 153 SCRA 183] the question of whether or not the principle
of abuse of rights has been violated resulting in damages under
Article 20 or Article 21 or other applicable provision of law,
depends on the circumstances of each case. x x x. 218
219
Globe Mackay Cable and Radio Corp. v. Court of Appeals, 257 Phil. 783, 783-785 (1989) [Per J.
Cortes, Third Division].
Philippine Journalists, Inc. (Peoples Journal) v. Thoenen, 513 Phil. 607, 625 (2005) [Per J. ChicoNazario, Second Division], citing Garrison v. Louisiana, 379 US 64 (1964), which in turn cited Justice
Stewarts concurring opinion in Rosenblatt v. Baer, 383 US 75 (1966).
70
Opinion
71
Opinion
221
Id. at 18.
72
Opinion
223
224
225
226
227
Pita v. Court of Appeals, 258-A Phil. 134, 146 (1989) [Per J. Sarmiento, En Banc], cited in Fernando
v. Court of Appeals, 539 Phil. 407, 416 (2006) [Per J. Quisumbing, Third Division].
Id., citing Kingsley Pictures v. N.Y. Regents, 360 US 684 (1959). The case involved the movie version
in Lady Chatterley's Lover.
Id. at 146.
Id. at 147.
Gonzales v. Kalaw-Katigbak, 222 Phil. 225 (1985) [Per C.J. Fernando, En Banc].
354 US 476, 487 (1957).
73
Opinion
231
232
233
234
235
74
Opinion
Gonzales v. Kalaw-Katigbak, 222 Phil. 225, 232 (1985) [Per C.J. Fernando, En Banc].
Pita v. Court of Appeals, 258-A Phil. 134, 145 (1989) [Per J. Sarmiento, En Banc],
Rep. Act No. 10175, sec. 4(c)(1).
Pita v. Court of Appeals, 258-A Phil. 134, 145 (1989) [Per J. Sarmiento, En Banc],
Rep. Act No. 10175, sec. 4(c)(1).
354 US 476 (1957).
75
Opinion
is one of the vital problems of human interest and public
concern. 242
242
243
244
245
246
247
248
249
250
Id.
Gonzales v. Kalaw-Katigbak, 222 Phil. 225, 233 (1985) [Per C.J. Fernando, En Banc].
See C. MacKinnon, ONLY WORDS (1993).
Id. at 14.
Id. at 14-15, 89-90.
Id. at 14-15, 88-91. Catharine MacKinnon and Andrea Dworkin proposed a law that defines
pornography as graphic sexually explicit materials that subordinate women through pictures or
words, p. 22.
Id. at 9.
Id. at 87-88.
Id at 87. See also C. MacKinnon, From Pornography, Civil Rights, and Speech, in DOING ETHICS 303
(2009).
76
Opinion
251
252
253
254
255
256
257
258
259
260
See C. MacKinnon, ONLY WORDS (1993); See also C. MacKinnon, From Pornography, Civil Rights,
and Speech, in DOING ETHICS 301.
See C. MacKinnon, ONLY WORDS (1993); See also C. MacKinnon, From Pornography, Civil Rights,
and Speech, in DOING ETHICS 309.
See C. MacKinnon, ONLY WORDS (1993); See also C. MacKinnon, From Pornography, Civil Rights,
and Speech, in DOING ETHICS.
See C. MacKinnon, ONLY WORDS (1993); See also C. MacKinnon, From Pornography, Civil Rights,
and Speech, in DOING ETHICS 300-302.
See C. MacKinnon, ONLY WORDS (1993); See also C. MacKinnon, From Pornography, Civil Rights,
and Speech, in DOING ETHICS 301-302, 307.
Baker, E. C. REVIEW: Of Course, More Than Words. Only Words. Catharine A. MacKinnon. 61 U.
Chi. L. Rev. 1181 (1994) 1197.
Id.
Id.
Id.
Id. at 1194.
77
Opinion
261
262
263
264
265
Id. at 1197-1211.
Id. at 1199.
Id. at 1203.
Id. at 1204.
Id.
78
Opinion
VI (E)
Child Pornography Different from Cybersex
It is apt to express some caution about how the parties confused child
pornography done through the internet and cybersex.
Section 4(c)(2), which pertains to child pornography, is different from
the cybersex provision. The provision on child pornography provides:
(2) Child Pornography. The unlawful or prohibited acts defined and
punishable by Republic Act No. 9775 or the Anti-Child Pornography Act
of 2009, committed through a computer system: Provided, That the
penalty to be imposed shall be (1) one degree higher than that provided
for in Republic Act No. 9775.
79
Opinion
VII (B)
Traffic Data and Expression
Traffic data, even as it is defined, still contains speech elements.
When, how, to whom, and how often messages are sent in the internet may
nuance the content of the speech. The message may be short (as in the 140character limit of a tweet) but when it is repeated often enough in the proper
context, it may imply emphasis or desperation. That a message used the
email with a limited number of recipients with some blind carbon copies
(Bcc) characterizes the message when it is compared to the possibility of
actually putting the same content in a public social media post.
The intended or unintended interception of these parts of the message
may be enough deterrent for some to make use of the space provided in
cyberspace. The parameters are so loosely and broadly defined as due
cause to be determined by law enforcers. Given the pervasive nature of
the internet, it can rightly be assumed by some users that law enforcers will
make use of this provision and, hence, will definitely chill their expression.
Besides, the provision insofar as it allows warrantless intrusion and
interception by law enforcers upon its own determination of due cause
does not specify the limits of the technologies that they can use. Traffic data
is related to and intimately bound to the content of the packets of
information sent from one user to the other or from one user to another
server. The provision is silent on the limits of the technologies and methods
that will be used by the law enforcer in tracking traffic data. This causes an
understandable apprehension on the part of those who make use of the same
servers but who are not the subject of the surveillance. Even those under
surveillance even only with respect to the traffic data have no
assurances that the method of interception will truly exclude the content of
the message.
As observed by one author who sees the effect of general and roving
searches on freedom of expression:
80
Opinion
267
C. Slobogin, Is the Fourth Amendment Relevant in a Technological Age?, in J. Rosen and B. Wittes,
eds., Constitution 3.0, 23 (2011), citing Justice Douglas in Papachristou v Jacksonville, 405 U.S. 156,
164 (1972) and W. H. Rehnquist, Is an Expanded Right of Privacy Consistent with Fair and Effective
Law Enforcement?; or Privacy, Youve Come a Long Way, Baby, 23 Kansas Law Review 1, 9 (1974).
G.R. No. 103956, March 31, 1992, 207 SCRA 712.
81
Opinion
cannot be pursued by means that broadly stifle fundamental
personal liberties when the end can be more narrowly achieved.
The breadth of legislative abridgment must be viewed in the light
of less drastic means for achieving the same basic purpose.
In Lovell v. Griffin, 303 US 444, 82 L ed 949, 58 S Ct 666, the
Court invalidated an ordinance prohibiting all distribution of
literature at any time or place in Griffin, Georgia, without a
license, pointing out that so broad an interference was unnecessary
to accomplish legitimate municipal aims. In Schneider v.
Irvington, 308 US 147, 84 L ed 155, 60 S Ct. 146, the Court dealt
with ordinances of four different municipalities which either
banned or imposed prior restraints upon the distribution of
handbills. In holding the ordinances invalid, the court noted that
where legislative abridgment of fundamental personal rights and
liberties is asserted, "the courts should be astute to examine the
effect of the challenged legislation. Mere legislative preferences or
beliefs respecting matters of public convenience may well support
regulation directed at other personal activities, but be insufficient
to justify such as diminishes the exercise of rights so vital to the
maintenance of democratic institutions," 308 US, at 161. In
Cantwell v Connecticut, 310 US 296, 84 L ed 1213, 60 S Ct. 900,
128 ALR 1352, the Court said that "[c]onduct remains subject to
regulation for the protection of society," but pointed out that in
each case "the power to regulate must be so exercised as not, in
attaining a permissible end, unduly to infringe the protected
freedom." (310 US at 304) (Shelton v. Tucker, 364 US 479
[1960] 268
268
Id. at 719-720.
82
Opinion
Traffic data refer only to the communications origin,
destination, route, time, date, size, duration, or type of
underlying service, but not content, nor identities.
83
Opinion
In In the Matter of the Petition for the Writ of the Petition for Issuance
of Writ of Habeas Corpus of Camilo L. Sabio v. Gordon, 269 this court
explained the determination of a violation of the right of privacy:
Zones of privacy are recognized and protected in our laws. Within
these zones, any form of intrusion is impermissible unless excused
by law and in accordance with customary legal process. The
meticulous regard we accord to these zones arises not only from
our conviction that the right to privacy is a "constitutional right"
and "the right most valued by civilized men," but also from our
adherence to the Universal Declaration of Human Rights which
mandates that, "no one shall be subjected to arbitrary interference
with his privacy" and "everyone has the right to the protection of
the law against such interference or attacks."
Our Bill of Rights, enshrined in Article III of the Constitution,
provides at least two guarantees that explicitly create zones of
privacy. It highlights a person's "right to be let alone" or the "right
to determine what, how much, to whom and when information
about himself shall be disclosed." Section 2 guarantees "the right
of the people to be secure in their persons, houses, papers and
effects against unreasonable searches and seizures of whatever
nature and for any purpose." Section 3 renders inviolable the
"privacy of communication and correspondence" and further
cautions that "any evidence obtained in violation of this or the
preceding section shall be inadmissible for any purpose in any
proceeding."
In evaluating a claim for violation of the right to privacy, a court
must determine whether a person has exhibited a reasonable
expectation of privacy and, if so, whether that expectation has been
violated by unreasonable government intrusion. 270
269
270
271
272
84
Opinion
In the more recent case of Valeroso v. People, 275 this court held that:
Unreasonable searches and seizures are the menace against which
the constitutional guarantees afford full protection. While the
power to search and seize may at times be necessary for public
welfare, still it may be exercised and the law enforced without
transgressing the constitutional rights of the citizens, for no
enforcement of any statute is of sufficient importance to justify
indifference to the basic principles of government. Those who are
supposed to enforce the law are not justified in disregarding the
rights of an individual in the name of order. Order is too high a
price to pay for the loss of liberty. 276
85
Opinion
278
279
280
Id. at 549.
G.R. No. 95902, February 4, 1992, 205 SCRA 791.
Id. at 798.
86
Opinion
Then again in People v. Balingan, 283 this court held that there was a
valid search and seizure, even if done in a moving vehicle. It gave the
rationale for this holding:
We also find no merit in appellant's argument that the marijuana flowering
tops should be excluded as evidence, they being the products of an alleged
illegal warrantless search. The search and seizure in the case at bench
happened in a moving, public vehicle. In the recent case of People vs. Lo
Ho Wing, 193 SCRA 122 (1991), this Court gave its approval to a
warrantless search done on a taxicab which yielded the illegal drug
commonly known as shabu. In that case, we raciocinated:
xxxx
87
Opinion
a moving vehicle is the object of the search on the basis of practicality.
This is so considering that before a warrant could be obtained, the place,
things and persons to be searched must be described to the satisfaction of
the issuing judge a requirement which borders on the impossible in
the case of smuggling effected by the use of a moving vehicle that can
transport contraband from one place to another with impunity. We might
add that a warrantless search of a moving vehicle is justified on the
ground that "it is not practicable to secure a warrant because the vehicle
can be quickly moved out of the locality or jurisdiction in which the
warrant must be sought." 284
Id. at 283-284.
G.R. Nos. 102009-10, July 6, 1994, 233 SCRA 716.
88
Opinion
prevailing, the raiding team had no opportunity to apply for and
secure a search warrant from the courts. The trial judge himself
manifested that on December 5, 1989 when the raid was
conducted, his court was closed. Under such urgency and exigency
of the moment, a search warrant could lawfully be dispensed
with. 286
But the internet has created other dangers to privacy which may not be
present in the usual physical spaces that have been the subject of searches
and seizures in the past. Commercial owners of servers and information
technologies as well as some governments have collected data without the
knowledge of the users of the internet. It may be that our Data Privacy
Law 287 may be sufficient.
Absent an actual case therefore, I am not prepared to declare Section
12 of Rep. Act 10175 as unconstitutional on the basis of Section 2 or Section
3(a) of Article III of the Constitution. My vote only extends to its declaration
of unconstitutionality because the unlimited breadth of discretion given to
law enforcers to acquire traffic data for due cause chills expression in the
internet. For now, it should be stricken down because it violates Article III,
Section 4 of the Constitution.
VIII
Limitations on Commercial Speech
are Constitutional
I dissent from the majority in their holding that Section 4(c)(3) of Rep.
Act No. 10175 is unconstitutional. This provides:
(3) Unsolicited Commercial Communications. The
transmission of commercial electronic communication with
the use of computer system which seek to advertise, sell, or
offer for sale product and services are prohibited unless:
(i) there is prior affirmative consent from the
recipient; or
(ii) the primary intent of the communication is for
service and/or administrative announcements from
the sender to its existing users, subscribers or
customers; or
(iii) the following conditions are present:
(aa)
the
commercial
electronic
communication contains a simple, valid, and
286
287
Id. at 728-729.
Rep. Act No. 10173, otherwise known as the Data Privacy Act of 2012.
89
Opinion
reliable way for the recipient to reject
receipt of further commercial electronic
messages (opt out) from the same source;
(bb)
the
commercial
electronic
communication does not purposely disguise
the source of the electronic message; and
(cc)
the
commercial
electronic
communication does not purposely include
misleading information in any part of the
message in order to induce the recipients to
read the message.
VIII (B)
Section 4(c)(3) Has No Chilling Effect
on Speech of Lower Value
Section 4(c)(3) of Rep. Act No. 10175 on unsolicited commercial
communication has no chilling effect. It is narrowly drawn. Absent an actual
case, it should not be declared as unconstitutional simply on the basis of its
provisions. I dissent, therefore, in the majoritys holding that it is
unconstitutional.
Commercial speech merited attention in 1996 in Iglesia ni Cristo v.
Court of Appeals. 290 In Iglesia ni Cristo, this court stated that commercial
288
289
290
Session No. 17, September 12, 2011, Fifteenth Congress, Second Regular Session
Id. at 279.
328 Phil. 893 (1996) [Per J. Puno, En Banc].
90
Opinion
speech is low value speech to which the clear and present danger test is
not applicable. 291
In 2007, Chief Justice Reynato Puno had the opportunity to expound
on the treatment of and the protection afforded to commercial speech in his
concurring and separate opinion in Pharmaceutical and Health Care
Association of the Philippines v. Duque III. 292 Writing to elucidate another
reason why the absolute ban on the advertising and promotion of breastmilk
substitutes x x x should be struck down, 293 he explained the concept of
commercial speech and traced the development of United States
jurisprudence on commercial speech:
The advertising and promotion of breastmilk substitutes
properly falls within the ambit of the term commercial speech-that
is, speech that proposes an economic transaction. This is a separate
category of speech which is not accorded the same level of
protection as that given to other constitutionally guaranteed forms
of expression but is nonetheless entitled to protection.
A look at the development of jurisprudence on the subject
would show us that initially and for many years, the United States
Supreme Court took the view that commercial speech is not
protected by the First Amendment. It fastened itself to the view
that the broad powers of government to regulate commerce
reasonably includes the power to regulate speech concerning
articles of commerce.
This view started to melt down in the 1970s. In Virginia
Pharmacy Board v. Virginia Citizens Consumer Council, the U.S.
Supreme court struck down a law prohibiting the advertising of
prices for prescription drugs. It held that price information was
important to consumers, and that the First Amendment protects the
"right to receive information" as well as the right to speak. It ruled
that consumers have a strong First Amendment interest in the free
flow of information about goods and services available in the
marketplace and that any state regulation must support a
substantial interest.
Central Hudson Gas & Electric v. Public Service
Commission is the watershed case that established the primary test
for evaluating the constitutionality of commercial speech
regulations. In this landmark decision, the U.S. Supreme Court
held that the regulation issued by the Public Service Commission
of the State of New York, which reaches all promotional
advertising regardless of the impact of the touted service on overall
energy use, is more extensive than necessary to further the state's
interest in energy conservation. In addition, it ruled that there must
be a showing that a more limited restriction on the content of
291
292
293
Id. at 933. Presently in the United States, the clear and present danger test is not applied to protect low
value speeches such as obscene speech, commercial speech and defamation.
561 Phil. 386 (2007) [En Banc].
Id. at 449.
91
Opinion
promotional advertising would not adequately serve the interest of
the State. In applying the First Amendment, the U.S. Court rejected
the highly paternalistic view that the government has complete
power to suppress or regulate commercial speech.
Central Hudson provides a four-part analysis for evaluating
the validity of regulations of commercial speech. To begin with,
the commercial speech must "concern lawful activity and not be
misleading" if it is to be protected under the First Amendment.
Next, the asserted governmental interest must be substantial. If
both of these requirements are met, it must next be determined
whether the state regulation directly advances the governmental
interest asserted, and whether it is not more extensive than is
necessary to serve that interest. 294 (Citations omitted)
294
295
296
297
298
Id. at 449-450.
569 Phil. 155 (2008) [En Banc].
Id. at 237.
Id.
Id. at 244.
92
Opinion
Another fundamental ground for regulating false or misleading
advertisement is Section 11(2), Article XVI of the Constitution
which states : The advertising industry is impressed with public
interest, and shall be regulated by law for the protection of
consumers and the promotion of the general welfare. 299
299
300
301
302
Id.
Page 14 of Justice Roberto Abads February 7, 2014 draft.
Central Hudson Gas & Electric v. Public Service Commission, 447 U.S. 557 (1980) <
http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=US&vol=447&invol=557> (visited February
13, 2014).
Id.
93
Opinion
303
304
Virginia Pharmacy Board v. Virginia Consumer Council, 425 U.S. 748 (1976) <
http://caselaw.lp.findlaw.com/cgi
bin/getcase.pl?friend=llrx&navby=volpage&court=us&vol=425&page=765> (visited February 21,
2014).
Id.
94
Opinion
Section 4(c) (3) of the Rep. Act No. 10175 refers only to commercial
speech since it regulates communication that advertises or sells products or
services. These communications, in turn, proposes only commercial or
economic transactions. Thus, the parameters for the regulation of
commercial speech as articulated in the preceding discussions are squarely
applicable.
305
306
Central Hudson Gas & Electric v. Public Service Commission, 447 U.S. 557 (1980) <
http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=US&vol=447&invol=557> (visited February
13, 2014).
Id. There are contrary opinions, but their reasoning is not as cogent. As explained by Justice Clarence
Thomas in his concurring opinion in 44 Liquormart, Inc. v. Rhode Island, 517 U.S. 484 (1996): I do
not see a philosophical or historical basis for asserting that "commercial" speech is of "lower value"
than "noncommercial" speech. Indeed, some historical materials suggest the contrary.
As noted by Aaron A. Scmoll, referring to the United States Supreme Court Decision in 44
Liquormart,: While Stevens and several other Justices seemed willing to apply strict scrutiny to
regulations on truthful advertising, a majority seemed content to continue down the path Central
Hudson created. The strongest reading drawn from 44 Liquormart may be that as to complete bans on
commercial speech, the Court will strictly apply Central Hudson so that in those cases, the analysis
resembles strict scrutiny. Schmoll, Aaron A. (1998) "Sobriety Test: The Court Walks the Central
Hudson Line Once Again in 44 Liquormart, but Passes on a New First Amendment Review, "Federal
Communications Law Journal: Vol. 50: Iss. 3, Article 11.
95
Opinion
The noxious effects of spam are clearly demonstrable. Any email user
knows the annoyance of having to sift through several spam messages in a
seemingly never ending quest to weed them out. Moreover, while certain
spam messages are readily identifiable, a significant number are designed (or
disguised) in such a way as to make a user think that they contain legitimate
content.
307
308
Rao, J. M. and D. H. Reiley, The Economics of Spam, JOURNAL OF ECONOMIC PERSPECTIVES, 26(3):
87-110 (2012).
Id.
96
Opinion
For instance, spam emails are given titles or headings like, Please
update your information, Conference Invitation, Please Confirm,
Alert, Hello My Dearest, and Unclaimed Check. Spam messages also
make reference to current events and civic causes.
Similarly, spam messages disguise themselves as coming from
legitimate sources by using subtle or inconspicuous alterations in sender
information. Thus, a letter i, which appears in the middle of a word, is
replaced with the number 1, a letter o may be replaced with the number
zero; a spam message may be made to appear to come from the legitimate
online financial intermediary PayPal, when in fact, the sending address is
paypol.com. At times, entirely false names are used, making spam
messages appear to come from relatively unfamiliar but ostensibly legitimate
senders such as low-key government agencies or civic organizations. As
noted by Cisco Systems: The content in the message looks and sounds
much more legitimate and professional than it used to. Spam often closely
mimics legitimate senders' messagesnot just in style but by spoofing the
sender information, making it look like it comes from a reputable sender. 309
The damage cost by spamming is manifest in calculable financial and
economic costs and not just in the nebulous vexation it causes users. IT
research firm Nuclear Research found that as far back as eleven (11) years
ago, in 2003, an average employee receives 13.3 spam messages a day.
Moreover, a person may spend as much as ninety (90) minutes a day
managing spam. This translates to 1.4% lost productivity per person per year
and an average cost of US$ 874 per employee per year. 310 A 2012 study also
noted that some US$20 billion is spent annually to fend off unwanted email
with US$6 billion spent annually on anti-spam software. 311
Apart from being associated with the vexation of users and costs
undermining productivity and efficiency, spamming is also a means for
actually attacking IT systems. The 2000 attack of the I Love You Worm,
which was earlier noted in this opinion, was committed through means of
email messages sent out to a multitude of users. While defensive
technologies against spamming have been developed (e.g., IP blacklisting,
crowd sourcing, and machine learning), spammers have likewise improved
on their mechanisms. The present situation is thus indicative of escalation,
an arms race playing out in cyberspace. As is typical of escalation, the
capacity of spammers to inflict damage has significantly increased. In 2003,
309
310
311
97
Opinion
312
Rao, J. M. and D. H. Reiley, The Economics of Spam, JOURNAL OF ECONOMIC PERSPECTIVES, 26(3):
87-110 (2012).
98
Opinion
313
314
315
California
Man
Guilty
of
Defrauding
AOL
Subscribers,
U.S.
Says,
<http://www.bloomberg.com/apps/news?pid=newsarchive&sid=a3ukhOXubw3Y> (visited February
14, 2014). On spam laws, < http://www.spamlaws.com/aol-phishing.html> (visited February 14,
2014).
Rep. Act No. 10175, sec. 4 (c) (3).
Rep. Act No. 10175, sec. 4 (c) (3).
99
Opinion
Rather than act with tempered but decisive vigilance for the protection
of these rights, we have precariously perched the freedoms of our people on
faith that those who are powerful and influential will not use the overly
broad provisions that prohibit libel, cyber libel, and cybersex against their
interests. We have exposed those that rely on our succor to the perils of
retaliation because we stayed our hand in declaring libel provisions as
unconstitutional. By diminishing the carefully drawn jurisprudential
boundaries of what is obscene and what is not, we have allowed the state to
unleash the dominant patriarchal notions of lascivious to police sexual
expression.
On the other hand, the majority has opted to strike down what appears
to be narrowly tailored protections against unsolicited commercial
communication through cyberspace. I decline to endow this kind of speech
the commercial and the corporate with more value. The balance struck
by the majority in this case weighs more heavily towards those who have
100
Opinion
more resources and are more powerful. We have put the balance in favor of
what is in the hegemony. Legitimate dissent will be endangered.
That, to me, is not what the Constitution says.
The Constitution protects expression. It affirms dissent. The
Constitution valorizes messages and memes at the margins of our society.
The Constitution also insists that we will cease to become a democratic
society when we diminish our tolerance for tp.e raw and dramatically
delivered idea, the uncouth defamatory remark, and the occasional lascivious
representations of ourselves.
What may seem odd to the majority may perhaps be the very kernel
that unlocks our collective creativity.
ACCORDINGLY, I vote to declare as unconstitutional for being
overbroad and violative of Article III, Section 4 of the Constitution the
following provisions of Republic Act No. 10175 or the Cybercrime
Prevention Act of 2012:
(a) The entire Section 19 or the "take down" provision;
(b) The entire Section 4(c)(4) on cyber libel as well as Articles 353,
354, and 355 on libel of the Revised Penal Code;
( c) The entire Section 4(c )( 1) on cybersex; .
(d) Section 5 as it relates to Sections 4(c)(l) and 4(c)(4);
( e) Section 6 as it increases the penalties to Sections 4( c)(1) and
4( c)(4);
(f) Section 7 as it allows impermissibly countless prosecution of
Sections 4( c)( 1) and 4( c)( 4 ); and
(g) Section 12. on warrantless real-time traffic data surveillance.
Associate Justice